Cybersecurity Merit Badge Merit Badge
Printable Guide

Cybersecurity Merit Badge β€” Complete Digital Resource Guide

https://merit-badge.university/merit-badges/cybersecurity/guide/

Getting Started

Introduction & Overview

Someone just stole 150 million people’s personal data β€” names, addresses, Social Security numbers β€” from a single company’s database. A teenager in another country shut down a hospital’s computer network with a piece of software smaller than a photo on your phone. And right now, while you are reading this sentence, automated programs are trying thousands of stolen passwords against accounts that might include yours. This is the world of cybersecurity, and understanding it is no longer optional.

Cybersecurity is the practice of protecting computers, networks, programs, and data from unauthorized access, damage, or theft. Every time you unlock your phone, log into a game, or send a message, layers of security work behind the scenes to keep your information safe. This merit badge teaches you how those protections work β€” and how to be part of the solution instead of part of the problem.

A glowing digital shield icon overlaid on a network of connected devices including a laptop, smartphone, smart home hub, and gaming console

Then and Now

Then: The Wild West of Computing

In the early days of computing, security was barely an afterthought. The first computers in the 1960s and 1970s were enormous machines locked in university basements, and the biggest threat was someone accidentally tripping over a power cable. Passwords were stored in plain text. Networks trusted every connected machine completely.

In 1988, a graduate student named Robert Tappan Morris released what became known as the Morris Worm β€” one of the first pieces of malware to spread across the internet. It wasn’t designed to cause damage, but a coding mistake made it replicate out of control, crashing roughly 6,000 computers (about 10% of the entire internet at the time). The incident led to the creation of the first Computer Emergency Response Team (CERT) and showed the world that connected computers needed real security.

Through the 1990s and early 2000s, viruses spread mainly through floppy disks and email attachments. Security meant installing antivirus software and hoping for the best. Most people didn’t think about cybersecurity at all.

Now: Everyone Is a Target

Today, cybersecurity is one of the fastest-growing fields in the world. There are over 15 billion internet-connected devices on the planet β€” more than two for every person alive. Cybercrime costs the global economy trillions of dollars each year. Attacks target everything from personal Instagram accounts to power grids, water treatment plants, and hospital systems.

Modern threats include ransomware that locks your files until you pay, phishing emails that look exactly like messages from your bank, and nation-state hackers backed by entire governments. But here is the encouraging part: the vast majority of successful attacks exploit simple mistakes that you can learn to avoid. Strong passwords, software updates, and knowing how to spot a scam stop most threats before they start.

Get Ready!

You are about to learn skills that protect not just you but your family, your troop, and your community. Cybersecurity knowledge is something you will use every single day β€” every time you create a password, connect to Wi-Fi, or download an app. By the end of this merit badge, you will understand how hackers think, how defenses work, and how to make smart decisions in a connected world. Let’s get started.

Kinds of Cybersecurity

Cybersecurity is a broad field with many specialties. Here are the main areas you will explore in this merit badge.

Network Security

Network security protects the highways that data travels on. Every time you load a website, send a text, or stream a video, your data crosses networks β€” home Wi-Fi, cellular towers, undersea cables, and data centers. Network security tools like firewalls and intrusion detection systems watch for suspicious traffic and block attacks before they reach your devices.

Think of network security like a series of locked gates and security checkpoints on a highway. Legitimate traffic passes through quickly, but anything that looks suspicious gets stopped and inspected.

Application Security

Application security focuses on making software safe to use. Every app on your phone, every website you visit, and every program on your computer was written by developers who had to think about how attackers might try to break in. Application security means finding and fixing those weak spots β€” called vulnerabilities β€” before someone exploits them.

When a company releases a security update for an app, that is application security in action. Someone found a flaw, and the developers patched it before attackers could take advantage.

Information Security

Information security (often called InfoSec) is about protecting data itself β€” whether it is stored on a hard drive, traveling across a network, or displayed on a screen. This includes personal information like your name, address, and passwords, as well as sensitive data like medical records, financial information, and government secrets.

InfoSec uses tools like encryption (scrambling data so only authorized people can read it) and access controls (making sure only the right people can reach certain information).

Operational Security

Operational security (OpSec) is about the human side of cybersecurity β€” the decisions and habits that keep systems safe. Even the best technology fails if people make careless mistakes. OpSec includes policies like “never share your password” and practices like shredding sensitive documents.

Personal and Consumer Security

This is the area most directly relevant to your daily life. Personal security covers protecting your own devices, accounts, and identity online. It includes choosing strong passwords, recognizing phishing attempts, securing your home Wi-Fi, backing up your data, and managing your digital footprint β€” the trail of information you leave behind as you use the internet.

Everything you learn in this merit badge ties back to personal security. Even if you never work in cybersecurity professionally, these skills will protect you for the rest of your life.

Five domains of cybersecurity: Network Security, Application Security, Information Security, Operational Security, and Personal Security
Safety First

Req 1a β€” Digital Safety Video

1a.
View the Personal Safety Awareness “Digital Safety” video (with your parent or guardian’s permission).

Before diving into firewalls and encryption, you need to understand the most basic layer of cybersecurity: keeping yourself safe online. The Digital Safety video from Scouting America covers real situations that young people face every day β€” from online predators to cyberbullying to oversharing personal information.

Why This Video Matters

You might think, “I already know not to talk to strangers online.” But digital safety goes far beyond that. The video covers situations that are genuinely tricky β€” moments where the right choice is not always obvious. What do you do when someone you have been chatting with online for months asks to meet in person? What about when a friend shares someone else’s embarrassing photo in a group chat? These gray areas are where real digital safety skills matter.

Key Concepts to Watch For

As you watch the video, pay attention to these core ideas:

  • Personal information protection β€” what counts as personal information and why sharing it can be risky
  • Online communication β€” how conversations with strangers can escalate and warning signs to watch for
  • Cyberbullying β€” what it looks like, how it affects people, and what to do if you see it or experience it
  • Reporting β€” who to talk to and how to report concerning behavior

After the Video

Think about how the scenarios in the video connect to your own online life. Do you use social media? Play online games with voice chat? Text with people you have only met online? The situations in the video are not hypothetical β€” they happen to real Scouts every day.

Your counselor will want to hear what stood out to you and how you plan to apply what you learned. Be ready to share specific examples from the video, not just general statements like “I learned to be safe online.”

Personal Safety Awareness β€” Digital Safety Access the official Scouting America Digital Safety video and other youth protection training resources. Link: Personal Safety Awareness β€” Digital Safety β€” https://www.scouting.org/training/youth-protection/scouts-bsa/
A teenager and parent sitting together at a desk looking at a laptop screen in a well-lit living room

Req 1b β€” Digital Footprint

1b.
Explain to your counselor how to protect your digital footprint, such as while using social media, mobile device apps, and online gaming. Show how to set privacy settings to protect your personal information, including photos of yourself or your location.

Every search you make, every post you like, every game you play online β€” each action adds another piece to your digital footprint. It is the collection of all the data you leave behind as you use the internet. Some of it you create on purpose, like a social media post. Some of it is collected without you even realizing, like a website tracking which pages you visit. And once information is out there, getting it back is nearly impossible.

What Is a Digital Footprint?

Your digital footprint has two parts:

  • Active footprint β€” information you deliberately share. This includes social media posts, comments, profile bios, uploaded photos, and messages you send. You have direct control over this.
  • Passive footprint β€” information collected about you without your direct input. This includes your IP address, browser cookies, location data from your phone, and your browsing history. Apps and websites collect this automatically.

Protecting Your Footprint on Social Media

Social media platforms are designed to encourage sharing. That is their business model β€” the more you share, the more data they have, and the more targeted ads they can sell. Here is how to share responsibly:

  • Review your profile. Remove your phone number, home address, school name, and full birthdate from public profiles. A city or state is enough for location.
  • Think before you post. Ask yourself: “Would I be comfortable if my school principal, a college admissions officer, or a future employer saw this?” If not, do not post it.
  • Check tagged photos. Other people can tag you in photos. Review tags and untag yourself from anything you do not want associated with your name.
  • Limit your audience. Most platforms let you restrict posts to friends only. Use this β€” there is no reason strangers need to see your vacation photos.

Privacy Settings: A Walkthrough

Every major platform has privacy settings, but they are often buried in menus and set to share more by default. Here are the key settings to check:

Privacy Settings Audit

Check these on every platform you use
  • Profile visibility: Set to “Friends Only” or “Private” instead of “Public.”
  • Location sharing: Turn off location tagging on posts. Disable location services for apps that do not need them.
  • Contact info: Hide your email and phone number from your public profile.
  • Search visibility: Disable “Allow search engines to link to your profile.”
  • Third-party app access: Revoke access for apps you no longer use. Each connected app can access your data.
  • Ad personalization: Opt out of interest-based advertising where possible.

Mobile Apps and Permissions

When you install an app, it often asks for permissions β€” access to your camera, microphone, contacts, location, and more. Many apps request far more access than they actually need.

Online Gaming and Voice Chat

Online games create unique privacy risks. Voice chat, screen names, and in-game messaging can all reveal personal information if you are not careful.

  • Use a screen name that does not include your real name, age, or location.
  • Be cautious in voice chat. Background noise can reveal information β€” siblings calling you by name, a parent mentioning your school, a TV news anchor naming your town.
  • Do not share personal details with online gaming friends, even ones you have played with for a long time. You do not truly know who is on the other side.

Showing Your Counselor

For this requirement, you need to demonstrate privacy settings β€” not just describe them. Pick one or two platforms you actually use (Instagram, Snapchat, Discord, a gaming platform) and walk your counselor through the settings step by step. Show them what each setting does and explain why you chose the configuration you did.

Protecting Your Digital Footprint β€” Keys to Cybersecurity A curriculum module from Cyber.org on understanding and managing your digital footprint. Link: Protecting Your Digital Footprint β€” Keys to Cybersecurity β€” https://cyber.org/find-curricula/protecting-your-digital-footprint-keys-cybersecurity
A trail of digital footprints containing icons for social media, location, search, shopping, and gaming

Req 1c β€” Physical Safety

1c.
Discuss first aid and prevention for potential injuries, such as eye strain, repetitive injuries, and handling electronics devices, that could occur during repeated use. Discuss how to keep yourself physically safe while using a mobile device (for example while walking or biking).

Cybersecurity is not only about protecting data β€” it is also about protecting your body. Hours spent staring at screens, hunched over keyboards, and scrolling on phones take a real physical toll. These injuries develop slowly, which makes them easy to ignore until they become serious.

Eye Strain and Digital Eye Fatigue

When you stare at a screen, you blink about 66% less than normal. Your eyes dry out. The muscles that focus your eyes get locked in one position. After a few hours, you might notice blurry vision, headaches, or a burning sensation. Doctors call this computer vision syndrome or digital eye strain, and it affects roughly 50% of regular computer users.

The 20-20-20 Rule

Every 20 minutes, look at something 20 feet away for at least 20 seconds. This relaxes the focusing muscles in your eyes and lets them reset. Set a timer on your phone if you tend to lose track of time while gaming or coding.

Repetitive Strain Injuries

Repetitive strain injuries (RSI) happen when you make the same small motion thousands of times β€” typing, clicking, swiping, or gripping a game controller. Common types include:

  • Carpal tunnel syndrome β€” pain, tingling, or numbness in your wrist and hand from repetitive wrist motions
  • Text neck β€” neck and upper back pain from looking down at a phone for long periods
  • Smartphone pinky β€” soreness or a dent in your little finger from supporting the weight of your phone
  • Trigger finger β€” stiffness or locking in a finger from repeated gripping or tapping

These injuries are not just for adults with desk jobs. Teenagers who game for hours, type long assignments, or scroll social media constantly are increasingly showing up with these conditions.

Ergonomic Setup

Workstation Ergonomics

Set up your desk to prevent injury
  • Screen at eye level: The top of your monitor should be at or just below eye level so you look slightly downward.
  • Arms at 90 degrees: Your elbows should form a right angle when typing, with your forearms parallel to the floor.
  • Feet flat on the floor: If your chair is too high, use a footrest. Dangling feet put strain on your lower back.
  • Wrists neutral: Your wrists should be straight, not bent up or down, while typing. A wrist rest can help.
  • Take breaks: Stand up and move every 30–45 minutes. Stretch your fingers, wrists, neck, and shoulders.

Handling Electronics Safely

Electronic devices have their own physical hazards beyond ergonomic injuries:

  • Heat β€” laptops can get hot enough to cause mild burns on your skin if used directly on your lap for long periods. Use a hard surface or a lap desk.
  • Batteries β€” lithium-ion batteries in phones and laptops can swell, overheat, or (rarely) catch fire. Never use a device with a visibly swollen battery. Do not charge devices on soft surfaces like beds or couches that trap heat.
  • Cables β€” frayed charging cables can cause electrical shocks or short circuits. Replace damaged cables immediately.

Mobile Device Safety While Moving

Every year, thousands of people are injured β€” and some are killed β€” because they were looking at their phone instead of watching where they were going. This is called distracted walking (or distracted cycling), and it is completely preventable.

  • Never text or scroll while crossing a street. Stop walking, step to the side, finish your message, then continue.
  • Do not use headphones at high volume while walking or biking. You need to hear traffic, cyclists, and other hazards around you.
  • Never use a phone while riding a bike. Pull over completely if you need to check a message or map.
  • Be aware in parking lots. Drivers backing out of spaces may not see a pedestrian who is looking down at a phone.
Computer Ergonomics for Kids Guidance from pediatric specialists on setting up ergonomic workstations for young people. Link: Computer Ergonomics for Kids β€” https://www.kidsplus.com/parent-resources/doctors-notes/computer-ergonomics/
Side-view diagram of proper computer workstation ergonomics showing screen at eye level, elbows at 90 degrees, feet flat on floor
Cyber Ethics

Req 2a β€” Scout Law Online

2a.
Relate three points of the Scout law to things people do on the internet or with computers, phones, and other connected electronic devices.

The Scout Law was written long before the internet existed, but every one of its twelve points applies directly to how you behave online. The challenge is that the internet makes it easy to forget them. Screens create a sense of distance β€” it is harder to see the impact of your words when you cannot see the other person’s face. This requirement asks you to bridge that gap.

The Scout Law, Refreshed for the Digital Age

You need to pick three points for your counselor. Here is how all twelve connect to online behavior, so you can choose the ones that resonate most with you:

Trustworthy

A Scout is trustworthy β€” online and offline. This means not creating fake accounts to deceive people, not sharing others’ secrets or private messages, and not pretending to be someone you are not. When you say something online, people should be able to rely on it being true.

Loyal

Loyalty online means standing up for friends when they are being cyberbullied β€” not just scrolling past. It also means not sharing someone’s personal information or embarrassing moments without their permission, even if “everyone else is doing it.”

Helpful

Being helpful online looks like answering questions in forums, teaching someone a skill through a tutorial, or reporting harmful content so platforms can remove it. It does not mean doing someone’s homework for them or sharing test answers.

Friendly

A friendly Scout treats people online the way they would in person. This means welcoming newcomers to online communities, being patient with people who are learning, and assuming good intentions before jumping to conclusions in text conversations (where tone is hard to read).

Courteous

Courtesy online means using respectful language even during disagreements, not interrupting others in voice chats, and acknowledging other people’s contributions. It also means not spamming, not sending unsolicited content, and respecting people’s time.

Kind

Kindness is the opposite of trolling. It means not posting hurtful comments for laughs, not piling on when someone makes a mistake, and thinking about how your words will affect the person reading them. Behind every screen name is a real person.

Obedient

Being obedient means following the rules β€” terms of service, school technology policies, and your family’s rules about screen time and online behavior. It also means respecting age restrictions on platforms (you need to be 13 for most social media accounts, for a reason).

Cheerful

A cheerful Scout brings positive energy to online spaces. This does not mean being fake or ignoring problems β€” it means choosing to contribute constructively instead of complaining, mocking, or tearing others down.

Thrifty

Digital thriftiness includes managing your data usage, not wasting bandwidth on unnecessary downloads, and being mindful of subscription costs. It also means valuing other people’s digital creations β€” not pirating software, music, or games.

Brave

Being brave online means speaking up when you see cyberbullying, reporting inappropriate content even when it is unpopular, and admitting when you have made a mistake instead of hiding behind anonymity. It takes real courage to do the right thing when no one is watching.

Clean

A clean Scout keeps their digital spaces organized and appropriate. This means keeping your devices free of malware, not visiting or sharing inappropriate content, and maintaining a digital footprint you would be proud to show anyone.

Reverent

Reverence online means respecting others’ beliefs, cultures, and perspectives β€” even when they differ from your own. It means not mocking, not starting flame wars over differences, and recognizing that the internet connects people from every background imaginable.

Preparing for Your Counselor

Pick the three points of the Scout Law that you find most relevant or challenging to apply online. For each one, think of a specific, real-world example β€” not just a generic statement. Your counselor will be much more interested in “Last month, someone in my gaming group was getting trolled, and I spoke up to defend them β€” that’s being Brave” than “Scouts should be brave online.”

Code of Ethics β€” EC-Council A professional cybersecurity code of ethics that mirrors many Scout Law principles in a technical context. Link: Code of Ethics β€” EC-Council β€” https://www.eccouncil.org/code-of-ethics/
Six points of the Scout Law represented as icons connected to digital scenarios: Trustworthy, Loyal, Brave, Kind, Courteous, and Helpful

Req 2b β€” Ethical Behavior

2b.
Discuss with your counselor examples of ethical and unethical behavior in cyberspace. Include how to act responsibly when you encounter situations such as: coming across an unattended or unlocked computer or mobile device; observing someone type their password or seeing it written down near a computer; or discovering a website that is not properly secured. Explain why these situations require good judgement, and how the Scout Law and personal values should guide your actions.

You find an unlocked phone on a library table. The owner stepped away for a moment. You could scroll through their messages, peek at their photos, or post something from their account as a “joke.” Nobody would know. What do you do?

This is the core of cyber ethics β€” doing the right thing when technology makes the wrong thing easy and anonymous.

The Ethics Spectrum

Not every online action is clearly “right” or “wrong.” Some fall into gray areas that require real judgment. Here is a framework:

Clearly ethical:

  • Reporting a phishing email to your email provider
  • Logging out of a shared computer when you are done
  • Telling a friend their account was hacked

Gray area:

  • Using an ad blocker (saves you annoyance but reduces revenue for content creators)
  • Reading someone’s public social media posts to learn about them
  • Using free public Wi-Fi to check your email

Clearly unethical:

  • Accessing someone else’s account without permission, even “as a joke”
  • Downloading pirated software, music, or movies
  • Sharing someone’s private photos or messages without consent
  • Using someone else’s Wi-Fi without their permission

The Three Scenarios

The requirement specifically asks about three situations. Let’s examine each one.

Scenario 1: An Unattended or Unlocked Device

You sit down at a library computer and the previous user is still logged into their email. Or you find a phone on a park bench with no lock screen.

The key principle: access does not equal permission. Just because you can look at someone’s data does not mean you should.

Scenario 2: Seeing Someone’s Password

A classmate types their password in front of you and you catch it. Or you see a sticky note on a monitor with login credentials written on it.

  • Do not use it. Even if you think it would be funny to change their wallpaper or send a joke message from their account.
  • Do not share it. Telling other people someone’s password is a betrayal of trust, even if you did not steal it intentionally.
  • Tell the person (privately and kindly) that their password is visible and suggest they change it. This is the helpful, trustworthy thing to do.
  • For the sticky note: If it is in a workplace or school, you might also mention it to the person responsible for IT security.

Scenario 3: An Insecure Website

You discover that a website has a security flaw β€” maybe personal data is visible in the URL, or you can access pages you should not be able to reach.

  • Do not explore the vulnerability. Do not try to access more data or test how far the flaw goes.
  • Report it. Contact the website owner or organization. Many companies have a “responsible disclosure” or “bug bounty” program specifically for reporting security issues.
  • Document what you saw (screenshot the URL or error, not the exposed data), so you can provide useful information in your report.

Why Good Judgment Matters

Technology changes fast, but ethics do not. You will encounter situations that no rule book covers. The Scout Law gives you a framework:

  • Trustworthy: Do not betray someone’s trust just because technology makes it possible.
  • Helpful: Use your skills to protect people, not exploit them.
  • Brave: Report problems even when it is easier to stay quiet.
Ethical Issues in Cybersecurity β€” CompTIA Future of Tech Explore real-world ethical dilemmas in cybersecurity, including privacy, surveillance, and whistleblowing. Link: Ethical Issues in Cybersecurity β€” CompTIA Future of Tech β€” https://www.futureoftech.org/cybersecurity/4-ethical-issues-in-cybersecurity/
Cyber Ethics Decision Guide flowchart with three decision points: Do I have permission, Could this harm someone, Would I do this if someone were watching
Cybersecurity Fundamentals

Req 3a β€” Systems to Protect

3a.
Describe three types of computer systems that need protecting and explain why.

When most people hear “computer system,” they think of a laptop or desktop. But the reality is far bigger. Computer systems run hospitals, control traffic lights, purify drinking water, and fly airplanes. When these systems get attacked, the consequences go way beyond a frozen screen or lost files β€” people’s lives can be at risk.

What Counts as a “Computer System”?

A computer system is any combination of hardware, software, and data working together to perform a task. That includes your laptop, sure β€” but it also includes the systems behind ATMs, the software managing your school’s grades, and the controllers that keep a power plant running safely.

Here are categories of systems that need cybersecurity protection, with examples of what happens when they are compromised.

Personal Devices and Home Networks

This is the layer closest to you β€” your phone, laptop, tablet, gaming console, and home Wi-Fi router. These devices store your personal information: photos, messages, passwords, financial data (if you shop online), and location history.

Why protect them?

  • Identity theft: a stolen Social Security number or birthdate can be used to open credit cards in your name
  • Financial loss: access to payment apps or saved credit cards means direct theft
  • Privacy invasion: personal photos, messages, and browsing history exposed to strangers
  • Botnet recruitment: compromised devices can be secretly used to attack other systems

Business and Enterprise Systems

Companies and organizations run computer systems that store customer data, process financial transactions, manage inventory, and coordinate employees. A single breach can expose millions of people’s personal information.

Why protect them?

  • Customer data protection: names, addresses, credit cards, and Social Security numbers for millions of people
  • Financial systems: direct access to money, payment processing, and banking transactions
  • Intellectual property: trade secrets, product designs, and competitive advantages worth billions
  • Operational continuity: a company that cannot access its own systems cannot serve its customers

Think about the businesses you interact with β€” your doctor’s office (medical records), your school (grades, personal info), your favorite online store (payment details). Every one of those organizations must protect the data you have entrusted to them.

Critical Infrastructure

This is where cybersecurity becomes a matter of life and death. Critical infrastructure refers to the systems that keep society functioning: power grids, water treatment plants, hospitals, transportation networks, and emergency services.

Why protect them?

  • Power grids: a cyberattack on the electrical grid could leave entire cities without power for days or weeks
  • Water systems: attackers could tamper with chemical levels in water treatment, making drinking water unsafe
  • Hospitals: ransomware has forced hospitals to turn away patients, delay surgeries, and lose access to medical records
  • Transportation: air traffic control, train switching systems, and traffic signals all run on computer systems

Choosing Your Three for Your Counselor

The requirement asks you to describe three types and explain why they need protection. You can pick from the categories above or identify your own β€” government systems, military networks, financial markets, educational institutions, and healthcare systems are all valid choices.

For each one, be ready to explain:

  1. What the system does β€” its purpose and what data it handles
  2. What could go wrong β€” specific consequences of a successful attack
  3. Who is affected β€” not just the organization, but the people who depend on it
Cybersecurity in Critical Infrastructure A detailed look at how cybersecurity protects the power grids and smart grids that keep our lights on. Link: Cybersecurity in Critical Infrastructure β€” https://www.cyberdefensemagazine.com/cybersecurity-in-critical-infrastructure-protecting-power-grids-and-smart-grids/
Three concentric layers of computer systems: Personal Devices, Business Systems, and Critical Infrastructure

Req 3b β€” The CIA Triad

3b.
Explain the “C.I.A. Triad”β€”Confidentiality, Integrity, and Availabilityβ€”and why these three principles are fundamental to cybersecurity.

Every cybersecurity decision β€” every firewall rule, every password policy, every encryption algorithm β€” traces back to three principles. They are so central to the field that professionals call them the CIA Triad (no relation to the government agency). If you understand these three concepts, you have the foundation for understanding everything else in cybersecurity.

Confidentiality

Confidentiality means that information is accessible only to the people who are authorized to see it. Your text messages should be readable only by you and the person you sent them to. Your medical records should be accessible only to you and your doctor. Your password should be known only to you.

How confidentiality is maintained:

  • Encryption scrambles data so only authorized people can read it
  • Access controls limit who can view certain files or systems
  • Authentication (passwords, fingerprints, face recognition) verifies that you are who you claim to be
  • Physical security keeps unauthorized people away from servers and devices

What happens when confidentiality fails:

When a company suffers a data breach, confidentiality has failed. Names, emails, passwords, credit card numbers β€” information that was supposed to be private β€” becomes public. The 2017 Equifax breach exposed the personal data of 147 million people, including Social Security numbers.

Integrity

Integrity means that information is accurate and has not been tampered with. When you send a message, it should arrive exactly as you wrote it. When your bank shows your account balance, that number should be correct. When a hospital looks up your blood type, that record better not have been changed by someone.

How integrity is maintained:

  • Hashing creates a unique digital fingerprint of data β€” if even one character changes, the hash changes completely (you will explore this more in Req 6c)
  • Digital signatures prove that a document came from who it claims to be from and has not been altered
  • Version control tracks every change to a file, so unauthorized modifications can be detected and reversed
  • Checksums verify that downloaded files are complete and uncorrupted

What happens when integrity fails:

Imagine a hacker changes one digit in a wire transfer from $1,000 to $1,000,000. Or modifies a patient’s medical record to show a different blood type. Or alters election results in a database. Integrity failures can cause financial loss, physical harm, or loss of trust in institutions.

Availability

Availability means that systems and data are accessible when authorized users need them. The best encryption and access controls in the world are useless if the system is down and nobody can reach it. A hospital’s electronic medical records are critical β€” if a cyberattack makes them unavailable during an emergency surgery, lives are at risk.

How availability is maintained:

  • Redundancy β€” backup systems that take over when primary systems fail
  • Load balancing β€” spreading traffic across multiple servers so no single one gets overwhelmed
  • DDoS protection β€” defenses against attacks that flood servers with fake traffic
  • Regular backups β€” copies of data that can be restored if the original is lost or encrypted by ransomware
  • Disaster recovery plans β€” documented procedures for getting systems back online quickly

What happens when availability fails:

Denial-of-Service (DoS) attacks flood a server with so much traffic that legitimate users cannot get through β€” like a thousand people calling the same phone number at once so no real calls can connect. Ransomware attacks encrypt an organization’s files and demand payment for the decryption key, making data unavailable until the ransom is paid (or backups are restored).

How the Three Work Together

The CIA Triad is a triad because all three principles must be balanced. Focusing too much on one can undermine another:

  • Too much confidentiality can hurt availability: if the login process is so strict that authorized users cannot get in, the system is effectively unavailable.
  • Too much availability can hurt confidentiality: making data easy to access for everyone means it is easy for attackers too.
  • Integrity without availability is pointless: perfectly accurate data that nobody can access helps no one.

Good cybersecurity finds the right balance among all three, based on what the system needs. A military database prioritizes confidentiality. A news website prioritizes availability. A banking system needs all three equally.

What Is the CIA Triad? β€” Coursera A clear overview of the CIA Triad with examples from real-world cybersecurity applications. Link: What Is the CIA Triad? β€” Coursera β€” https://www.coursera.org/articles/cia-triad
The CIA Triad triangle diagram showing Confidentiality, Integrity, and Availability
Threats & Attacks

Req 4a β€” Threats & Vulnerabilities

4a.
Define the terms vulnerability, threat, and exploit, and give an example of each that might apply to a website or software product you use.

These three words β€” vulnerability, threat, and exploit β€” are the building blocks of cybersecurity language. Every attack, every defense, every news story about a breach comes back to these concepts. Understanding how they fit together is like learning the basic vocabulary of a new language.

Vulnerability

A vulnerability is a weakness or flaw in a system that could be used to cause harm. It is a door left unlocked, a window with a broken latch, a gap in the fence. The vulnerability exists whether or not anyone takes advantage of it.

Examples:

  • A website that does not require strong passwords (allowing passwords like “123456”)
  • Software that has not been updated and contains a known bug
  • A Wi-Fi network that uses outdated encryption
  • An app that stores passwords in plain text instead of encrypting them

Think of a vulnerability like a crack in a dam. The crack may sit there for years without causing a flood β€” but it is always a risk.

Threat

A threat is anything that could exploit a vulnerability to cause damage. Threats can be people (hackers, disgruntled employees), software (malware, ransomware), or events (natural disasters that knock out data centers). A threat is the potential for harm β€” the person who might notice that unlocked door.

Examples:

  • A hacker scanning websites for known vulnerabilities
  • A phishing email designed to trick you into revealing your password
  • A disgruntled employee who still has access to company systems after being fired
  • A power outage that crashes servers without proper backup

Exploit

An exploit is the actual method or action used to take advantage of a vulnerability. It is the moment the unlocked door gets opened. An exploit turns a theoretical risk into a real attack.

Examples:

  • A piece of code that takes advantage of a software bug to gain unauthorized access
  • Using a stolen password (the vulnerability was weak password requirements) to log into someone’s account
  • Sending a specially crafted message to a website’s login form that tricks it into revealing database contents (called a SQL injection)
  • Using a known Wi-Fi vulnerability to intercept someone’s data on a public network

How They Fit Together

The relationship is sequential:

  1. A vulnerability exists (a flaw or weakness)
  2. A threat recognizes the vulnerability (someone or something that could cause harm)
  3. An exploit takes advantage of it (the actual attack)

Here is a concrete example using a website you might use:

ConceptSocial Media Example
VulnerabilityThe site allows unlimited login attempts with no lockout
ThreatAn attacker with a list of common passwords
ExploitThe attacker runs an automated program that tries thousands of passwords against your account until one works (called a brute force attack)

And another example:

ConceptGaming Platform Example
VulnerabilityThe game’s chat system does not filter links
ThreatA scammer who creates fake “free V-Bucks” websites
ExploitThe scammer posts links in game chat; players who click enter their login credentials on a fake site, giving the scammer their accounts

Applying This to Your Life

For your counselor, think about a website or app you actually use. Walk through the three concepts:

  1. What vulnerability might it have?
  2. What threat could take advantage of it?
  3. What would the exploit look like in practice?

You do not need to find a real vulnerability β€” this is a thought exercise about understanding the concepts.

Hackers & Cyber Attacks β€” Crash Course Computer Science A fast-paced, entertaining overview of how cyber attacks work from the Crash Course team. Link: Hackers & Cyber Attacks β€” Crash Course Computer Science β€” https://www.youtube.com/watch?v=_GzE99AmAQU&list=PL8dPuuaLjXtNlUrzyH5r6jN9ulIgZBpdo&index=33
Three-step attack chain diagram: Vulnerability (cracked wall), Threat (figure noticing the crack), Exploit (figure reaching through)

Req 4b β€” Malware

4b.
Pick one type of malware (such as virus, worm, Trojan, backdoor, spyware, or ransomware) and find out how it works. Explain what it does and the harm it can cause.

Malware β€” short for “malicious software” β€” is any software designed to damage, disrupt, or gain unauthorized access to computer systems. It is the weapon of choice for most cyberattacks. Understanding how malware works is like learning how a burglar thinks β€” it helps you lock the right doors.

The Malware Family

Before you pick one to research in depth, here is an overview of the major types. Each works differently and causes different kinds of harm.

Virus

A virus attaches itself to a legitimate program or file and spreads when that file is shared or executed. Just like a biological virus, it needs a “host” to travel. You might get one by downloading a file from an untrustworthy source or opening an infected email attachment. Viruses can corrupt files, slow down your computer, or delete data entirely.

Worm

A worm is like a virus that does not need a host. It spreads on its own across networks, replicating itself from computer to computer without any human action. The Morris Worm mentioned in the Introduction was one of the first β€” it crashed 10% of the internet in 1988.

Trojan

Named after the Trojan Horse from Greek mythology, a Trojan disguises itself as legitimate software. You think you are downloading a free game, a useful utility, or a media player β€” but hidden inside is malware. Unlike viruses and worms, Trojans do not replicate themselves. They rely on tricking you into installing them.

Backdoor

A backdoor creates a hidden entry point into a system, allowing an attacker to bypass normal authentication. Some backdoors are planted by hackers after an initial break-in; others are accidentally left in software during development. Once a backdoor is in place, an attacker can come and go as they please.

Spyware

Spyware secretly monitors your activity β€” keystrokes (called a keylogger), websites visited, files opened, and even screenshots. It sends this information back to the attacker. Spyware is often bundled with free software or arrives through phishing attacks. You may never know it is there.

Ransomware

Ransomware encrypts your files β€” photos, documents, everything β€” and demands payment (usually in cryptocurrency) for the decryption key. If you do not pay, your files stay locked forever. If you do pay, there is no guarantee the attacker will actually unlock them. Ransomware has become one of the most profitable forms of cybercrime.

How to Research Your Chosen Type

The requirement says to pick one and find out how it works. Here is a framework for your research:

Malware Research Framework

Answer these questions about your chosen type
  • How does it get onto a computer? (infection method)
  • Does it spread to other computers? If so, how?
  • What does it do once installed? (payload)
  • How does it hide from the user or antivirus software?
  • What harm can it cause? (data loss, financial damage, privacy violation, system damage)
  • What are one or two real-world examples of this malware in action?
  • How can you protect yourself against it?

Protecting Yourself

Regardless of which type you research, the defenses against malware are surprisingly consistent:

  • Keep software updated β€” many malware exploits target known vulnerabilities that patches have already fixed (you will cover this in Req 5b)
  • Do not download from untrustworthy sources β€” stick to official app stores and verified websites
  • Do not click suspicious links β€” in emails, texts, or chat messages (covered in Req 4d)
  • Use antivirus software β€” and keep it updated (covered in Req 5c)
  • Back up your data β€” if ransomware strikes, a recent backup means you do not need to pay
Computer Malware β€” Khan Academy An interactive article explaining different malware types with examples and prevention tips. Link: Computer Malware β€” Khan Academy β€” https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware
Comparison chart of six malware types: Virus, Worm, Trojan, Backdoor, Spyware, and Ransomware

Req 4c β€” Public Wi-Fi Risks

4c.
Identify two risks of using public Wi-Fi and describe how to reduce or avoid those risks.

You walk into a coffee shop, a library, or an airport and connect to the free Wi-Fi without a second thought. Millions of people do this every day. But that open network β€” the one that does not even require a password β€” is one of the easiest places for an attacker to steal your information. Here is why.

Why Public Wi-Fi Is Risky

Home Wi-Fi networks typically use encryption (like WPA2 or WPA3) and a password that only your family knows. Public Wi-Fi often has no encryption at all, or uses a shared password that everyone in the building knows. This means the data you send and receive can potentially be seen by anyone else on the same network.

Two major risks stand out:

Risk 1: Man-in-the-Middle Attacks

In a man-in-the-middle (MITM) attack, an attacker positions themselves between you and the Wi-Fi router. Instead of your data going directly to the internet, it passes through the attacker’s device first. They can see everything you send β€” passwords, messages, credit card numbers β€” and even modify data in transit.

How it works: the attacker uses freely available software to intercept network traffic on the same Wi-Fi network. If you visit a website that is not encrypted (HTTP instead of HTTPS), the attacker can read everything on the page, including anything you type into forms.

Risk 2: Evil Twin Networks

An evil twin is a fake Wi-Fi network set up by an attacker to look like a legitimate one. You think you are connecting to “CoffeeShop_WiFi” but you are actually connecting to the attacker’s hotspot β€” a device sitting in their backpack. All your traffic flows through their equipment, and they can see everything.

Evil twins are surprisingly easy to create. An attacker can set up a fake hotspot with a smartphone or a small portable router. They name it something that looks official β€” “Airport_Free_WiFi” or “Library_Guest” β€” and wait for people to connect.

How to Stay Safe on Public Wi-Fi

You do not need to avoid public Wi-Fi entirely β€” but you need to use it carefully.

Public Wi-Fi Safety

Follow these rules whenever you connect to public networks
  • Use a VPN: A Virtual Private Network encrypts all your traffic, making it unreadable even on an insecure network. This is the single most effective protection.
  • Verify the network name: Ask a staff member for the exact network name. Do not connect to networks with generic names like “Free WiFi.”
  • Use HTTPS only: Look for the padlock icon in your browser. Never enter passwords or payment info on HTTP sites.
  • Avoid sensitive activities: Do not access banking, make purchases, or enter important passwords on public Wi-Fi without a VPN.
  • Turn off auto-connect: Disable the setting that automatically connects to available networks. Connect manually and only to networks you trust.
  • Forget the network: After you disconnect, tell your device to forget the network so it does not reconnect automatically later.
Understanding Firewalls for Home and Small Office Use β€” CISA Learn how firewalls protect your devices on networks, including tips relevant to public Wi-Fi security. Link: Understanding Firewalls for Home and Small Office Use β€” CISA β€” https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
Comparison of safe VPN-protected connection vs unsafe public Wi-Fi with attacker intercepting data

Req 4d β€” Spoofing & Phishing

4d.
Describe what spoofing and phishing are, and how to recognize a message or website that might be trying to trick you. Explain what steps you should take to protect yourself and others if you come across one.

You get an email from your bank: “We detected suspicious activity on your account. Click here to verify your identity immediately.” The email looks real β€” it has the bank’s logo, the right colors, even a professional tone. But the link leads to a fake website designed to steal your password. This is phishing, and it is the most common cyberattack in the world.

What Is Spoofing?

Spoofing is pretending to be someone or something you are not. It is the umbrella technique behind many cyberattacks. Attackers “spoof” trusted identities to trick you into lowering your guard.

Common types of spoofing:

  • Email spoofing β€” sending an email that appears to come from a trusted address (your school, your bank, a friend)
  • Caller ID spoofing β€” making a phone call that shows a fake number on your caller ID
  • Website spoofing β€” creating a fake website that looks identical to a real one
  • IP spoofing β€” disguising the origin of network traffic to bypass security systems

What Is Phishing?

Phishing is a specific attack that uses spoofing to trick you into giving up sensitive information β€” passwords, credit card numbers, Social Security numbers, or login credentials. The name comes from “fishing” β€” the attacker casts bait and waits for someone to bite.

Types of Phishing

  • Email phishing β€” mass emails sent to thousands of people, hoping some will click
  • Spear phishing β€” targeted emails crafted for a specific person using personal details (“Hi Marcus, here is the camping trip schedule you asked about”)
  • Smishing β€” phishing via SMS text messages (“Your package could not be delivered. Click to reschedule.”)
  • Vishing β€” phishing via voice calls (“This is the IRS. You owe back taxes. Press 1 to pay immediately.”)

How to Spot a Phishing Attempt

Phishing messages are getting more sophisticated every year, but they still leave clues.

Phishing Red Flags

Check for these warning signs in any suspicious message
  • Urgency and threats: “Your account will be suspended in 24 hours” or “Act now or lose access.” Legitimate companies rarely threaten you via email.
  • Generic greetings: “Dear Customer” or “Dear User” instead of your actual name.
  • Suspicious sender address: The display name might say “Apple Support” but the actual email is something like support@apple-verify-id.com. Check the full email address.
  • Misspellings and bad grammar: Professional companies proofread their emails. Multiple errors are a red flag.
  • Unexpected attachments: Do not open attachments you did not expect, especially .exe, .zip, or .doc files.
  • Mismatched links: Hover over a link (without clicking) to see where it actually goes. If the display text says “www.paypal.com” but the URL goes somewhere else, it is a phish.
  • Requests for sensitive information: Legitimate companies will never ask for your password, full Social Security number, or credit card number via email.

Recognizing Fake Websites

Phishing emails often lead to fake websites that look nearly identical to the real thing. Here is how to spot them:

  • Check the URL carefully. Look for subtle misspellings: “paypa1.com” (with a number 1 instead of the letter l), “arnazon.com” instead of “amazon.com.”
  • Look for HTTPS. While HTTPS alone does not guarantee a site is legitimate (attackers can get certificates too), the absence of HTTPS on a login page is a definite red flag.
  • Look for visual inconsistencies. Blurry logos, broken formatting, or links that do not work can indicate a hastily created fake site.
  • Test non-critical links. On a real company website, the “About Us,” “Contact,” and “Privacy Policy” links all work. On a phishing site, they often lead nowhere.
Be Internet Alert β€” Google Interactive resources from Google for recognizing phishing, scams, and other online deceptions. Link: Be Internet Alert β€” Google β€” https://beinternetawesome.withgoogle.com/

Req 4e β€” Current Events

4e.
Current Events. Do ONE of the following:

This requirement connects everything you have learned to real events happening in the world right now. You have two options β€” pick the one that interests you most.

Option 1: Read About a Cybersecurity Incident

4e1.
Read an article or a news report about a recent cybersecurity incident, such as a data breach or malware infection. Explain how the incident happened (to the best of your ability based on the information available) and what the consequences are or might be to the victim.

Cybersecurity incidents happen almost daily. Finding one to read about is not hard β€” the challenge is understanding it deeply enough to explain it to your counselor.

Where to Find Articles

Look for reputable cybersecurity news sources that explain incidents in detail:

Krebs on Security In-depth investigative journalism on cybersecurity by Brian Krebs, one of the most respected reporters in the field. Link: Krebs on Security β€” https://krebsonsecurity.com/ WIRED Security Accessible cybersecurity reporting that explains technical topics for a general audience. Link: WIRED Security β€” https://www.wired.com/category/security/ SecurityWeek Daily cybersecurity news covering breaches, vulnerabilities, and industry developments. Link: SecurityWeek β€” https://www.securityweek.com/

What to Look For in Your Article

When you read about an incident, try to answer these questions:

  • What happened? Was it a data breach, ransomware attack, phishing campaign, or something else?
  • How did it happen? What vulnerability was exploited? Use the terms you learned in Req 4a β€” can you identify the vulnerability, threat, and exploit?
  • Who was affected? How many people? What kind of data was exposed?
  • What were the consequences? Financial loss, identity theft, service disruptions, legal penalties?
  • What could have prevented it? Could better passwords, updates, or employee training have stopped the attack?

Option 2: Watch a Movie or Read a Book

4e2.
With your parent or guardian’s permission, watch a movie or read a book in which cybersecurity plays a significant role. Discuss how cybersecurity topics were depicted and how realistic you think it was.

Movies and books love cybersecurity β€” but they often get the details hilariously wrong. This option asks you to be a critical viewer: separate the realistic depictions from the Hollywood fiction.

Possible Movies and Books

Here are some options to consider (check ratings and get parent/guardian permission):

Movies:

  • WarGames (1983) β€” A teenager accidentally hacks into a military computer. A classic that launched public awareness of hacking.
  • The Imitation Game (2014) β€” The true story of Alan Turing breaking the Enigma code in World War II. Directly relevant to Req 6 β€” Cryptography.
  • Sneakers (1992) β€” A team of security experts tests systems by trying to break into them (penetration testing).

Books:

  • Hacking: The Art of Exploitation by Jon Erickson (advanced, but fascinating)
  • Ghost in the Wires by Kevin Mitnick β€” The memoir of one of the most famous hackers in history
  • Countdown to Zero Day by Kim Zetter β€” The story of the Stuxnet worm (mentioned in Req 3b)

What to Discuss with Your Counselor

For whichever movie or book you choose, consider:

  • What cybersecurity concepts were shown? (encryption, hacking, social engineering, malware, etc.)
  • What was realistic? Did the hacking scenes show actual techniques, or did someone just type fast and say “I’m in”?
  • What was unrealistic? In real life, hacking usually takes days or weeks, not seconds. Progress bars that conveniently reach 100% just in time are pure fiction.
  • What lesson does the story teach? Does it show cybersecurity as something to fear, or as a tool for protection?
A teenager sitting on a couch reading a tablet showing a cybersecurity news article, with notepad nearby

Req 4f β€” Attack Surface

4f.
Create a list of what is part of your cyber attack surface including all the ways someone could try to access your personal information or devicesβ€”such as online accounts, apps, or home networks.

Your attack surface is every possible point where an attacker could try to get into your digital life. Think of it as all the doors, windows, and vents in a building β€” the more entry points, the harder the building is to secure. Most people have a much larger attack surface than they realize.

What Makes Up Your Attack Surface?

Your attack surface includes everything that connects you to the digital world. Let’s walk through the major categories.

Devices

Every device you own or use regularly is part of your attack surface:

  • Your smartphone
  • Laptop or desktop computer
  • Tablet
  • Gaming console (Xbox, PlayStation, Nintendo Switch)
  • Smart watch or fitness tracker
  • Any other connected device (smart speaker, streaming stick, etc.)

Each device has its own operating system, its own apps, its own vulnerabilities. An attacker who compromises any one of them gains a foothold into your digital life.

Online Accounts

Think about every account you have ever created β€” and be honest, because the number is probably higher than you think:

  • Email accounts
  • Social media (Instagram, Snapchat, TikTok, Discord, X, Reddit)
  • Gaming platforms (Steam, Epic Games, PlayStation Network, Xbox Live)
  • Shopping sites (Amazon, eBay)
  • School accounts (Google Classroom, Canvas, Schoology)
  • Streaming services (Netflix, Spotify, YouTube, Disney+)
  • Cloud storage (Google Drive, iCloud, Dropbox)
  • Any forums, communities, or websites with a login

Each account is a potential target. If any two share the same password, compromising one compromises both.

Apps and Software

Every app installed on your devices is part of your attack surface:

  • How many apps are on your phone right now? Check β€” it is probably more than 50.
  • Each app has permissions (camera, microphone, location, contacts) that could be exploited
  • Apps you installed and forgot about are especially risky β€” they may not be getting security updates

Home Network

Your home network is its own attack surface:

  • Wi-Fi router (is the admin password still the default one printed on the sticker?)
  • Connected devices β€” smart TVs, smart speakers, security cameras, thermostats
  • Guest networks β€” who else has your Wi-Fi password?
  • IoT devices (you will explore these more in Req 7)

Personal Information Already Online

Some parts of your attack surface already exist whether you want them to or not:

  • Information others have posted about you (photos, mentions, tagged posts)
  • Public records (some states make certain records publicly searchable)
  • Data from breaches of companies you have done business with
  • Your digital footprint from Req 1b

Creating Your List

Here is how to systematically map your attack surface:

Attack Surface Inventory

Go through each category and list everything
  • Devices: List every device you use regularly, including shared family devices.
  • Accounts: Open your email and search for “welcome” or “verify your email” to find accounts you may have forgotten.
  • Apps: Go through your phone and computer app lists. Include browser extensions.
  • Home network: List your router and every smart or connected device in your home.
  • Shared access: Note any accounts where you share passwords with friends or family.
  • Old accounts: Include accounts you no longer use but never deleted β€” these are often the most vulnerable.

What Your List Tells You

Once you see your full attack surface, you will likely be surprised by its size. The goal is not to eliminate everything β€” you cannot live without digital tools. The goal is to reduce your attack surface where possible and strengthen the parts you keep.

Quick Wins to Shrink Your Attack Surface

  • Delete apps you do not use. Every unused app is an unmonitored entry point.
  • Close old accounts. That MySpace account from 2008? Close it. That free game you tried once? Delete the account.
  • Remove unnecessary permissions. Apps that do not need your location, microphone, or contacts should not have access.
  • Change default passwords on your router and any IoT devices.
  • Use unique passwords for every account (a password manager helps β€” covered in Req 5c).
Connected Devices β€” Keys to Cybersecurity A lesson module from Cyber.org about managing the security of your connected devices. Link: Connected Devices β€” Keys to Cybersecurity β€” https://cyber.org/find-curricula/connected-devices-keys-cybersecurity
Infographic showing a teenager with radiating connections to their digital attack surface: devices, accounts, and networks
Cyber Defenses

Req 5a β€” Defense Technologies

5a.
Describe three technologies that are used to defend a computer or network, such as access controls, antivirus software, firewall, intrusion detection/prevention systems, and Virtual Private Network.

You have spent the last several requirements learning how attackers operate. Now it is time to switch sides and learn about the tools defenders use. Every technology described here exists as a direct response to the threats you studied β€” firewalls block unauthorized traffic, antivirus catches malware, and VPNs encrypt your connection on risky networks.

Firewalls

A firewall is a barrier between your computer (or network) and the outside world. It inspects incoming and outgoing network traffic and decides what to allow and what to block based on a set of rules.

Think of a firewall as a bouncer at a door. The bouncer has a list of who is allowed in and who is not. Legitimate traffic gets through; suspicious traffic gets turned away.

How it works:

  • Examines each data packet (a small chunk of network traffic) for its source, destination, and type
  • Compares the packet against its rules β€” is this traffic expected? Is it from a trusted source? Is it going to an allowed destination?
  • Blocks or allows the packet accordingly
  • Logs suspicious activity for review

Types of firewalls:

  • Software firewalls run on your computer (Windows Firewall, macOS Firewall). They protect that individual device.
  • Hardware firewalls are built into your router. They protect your entire home network.
  • Cloud firewalls protect servers and online services.

Most home networks use both β€” your router’s built-in firewall plus the software firewall on each device.

Antivirus and Anti-Malware Software

Antivirus software scans your computer for known malware and removes it. Modern antivirus programs do much more than catch viruses β€” they detect worms, Trojans, spyware, ransomware, and other threats you learned about in Req 4b.

How it works:

  • Signature-based detection β€” the software has a database of known malware “signatures” (unique code patterns). It scans files and compares them against this database.
  • Heuristic analysis β€” instead of looking for exact matches, it analyzes program behavior. If a program tries to encrypt all your files or send data to an unknown server, the antivirus flags it as suspicious even if it is not in the database.
  • Real-time protection β€” the software runs continuously, scanning files as you download, open, or execute them.

Intrusion Detection and Prevention Systems (IDS/IPS)

An Intrusion Detection System (IDS) monitors network traffic for signs of an attack and alerts administrators when it finds something suspicious. An Intrusion Prevention System (IPS) goes a step further β€” it detects the attack and automatically blocks it.

How they differ from firewalls:

  • A firewall is like a locked door β€” it keeps unauthorized traffic out based on predefined rules.
  • An IDS is like a security camera β€” it watches for suspicious behavior inside the network and raises an alarm.
  • An IPS is like a security guard watching the camera who can tackle an intruder on the spot.

IDS/IPS systems look for patterns that indicate attacks β€” repeated failed login attempts, unusual data transfers, or network scanning. They are critical for organizations but less common in home networks.

Virtual Private Network (VPN)

A VPN creates an encrypted tunnel between your device and a remote server. All your internet traffic flows through this tunnel, hiding it from anyone trying to snoop β€” including your internet service provider, hackers on public Wi-Fi (as discussed in Req 4c), and even the Wi-Fi network operator.

How it works:

  1. Your device connects to a VPN server (run by the VPN provider)
  2. All your internet traffic is encrypted before leaving your device
  3. The VPN server decrypts your traffic and forwards it to its destination
  4. Responses come back to the VPN server, are encrypted, and sent back to you

When to use a VPN:

  • On public Wi-Fi networks (coffee shops, airports, hotels)
  • When you want to prevent your ISP from tracking your browsing
  • When accessing sensitive information on untrusted networks

Access Controls

Access controls determine who can access what resources on a system. This includes:

  • Authentication β€” proving who you are (passwords, biometrics, MFA)
  • Authorization β€” defining what you are allowed to do once authenticated
  • Accounting β€” tracking what you actually did (audit logs)

Access controls follow the principle of least privilege β€” every user should have the minimum access they need to do their job, and no more. Your school might give you access to Google Classroom but not the admin panel where teachers enter grades.

Choosing Your Three

Pick three of these technologies to discuss with your counselor. For each one, be ready to explain:

  1. What it does and how it works
  2. What threats it defends against
  3. Where you might encounter it in your own life
Technologies in Cybersecurity β€” CompTIA Future of Tech An overview of cybersecurity technologies with real-world applications and career connections. Link: Technologies in Cybersecurity β€” CompTIA Future of Tech β€” https://www.futureoftech.org/cybersecurity/3-technologies-in-cybersecurity/
Layered defense diagram showing Firewall, IDS/IPS, VPN, Antivirus, and Access Controls from outer to inner

Req 5b β€” Installing Updates

5b.
Installing updates. Do the following:

This requirement covers two connected tasks: understanding why updates matter and demonstrating how to install them.

5b1.
Explain to your counselor the importance of installing the latest updates on your computer, why they are needed, and what kinds of problems they can prevent.

Why Updates Matter

That notification nagging you to “Restart to install updates” is not just an annoyance β€” it might be the most important cybersecurity tool on your device. Software updates fix known vulnerabilities that attackers are actively trying to exploit. Delaying an update is like knowing your front door lock is broken and choosing not to fix it.

What Updates Contain

Software updates typically include three types of changes:

  • Security patches β€” fix vulnerabilities that could be exploited by attackers. These are the critical ones.
  • Bug fixes β€” resolve crashes, errors, and unexpected behavior.
  • Feature improvements β€” add new functionality or improve performance.

Security patches are by far the most important. When a security researcher discovers a vulnerability, the software company races to create a patch before attackers can exploit it. Once the patch is released, the clock starts ticking β€” attackers reverse-engineer the patch to figure out the vulnerability it fixes, then target anyone who has not updated yet.

What Kinds of Problems Updates Prevent

  • Malware infections β€” patches close the security holes that malware uses to get in
  • Data breaches β€” unpatched software is one of the top causes of organizational data breaches
  • Ransomware β€” many ransomware variants specifically target known, unpatched vulnerabilities
  • Account compromises β€” browser and app updates fix flaws that could expose your login credentials
  • System instability β€” bug fixes prevent crashes and data loss

5b2.
Demonstrate to your counselor how to check for, download, and install the latest updates for your computer or mobile device, or another computer you have permission to use (if you are unable to do this on your computer, you may use an online guide with screenshots to demonstrate this). Show your counselor how to verify that your computer or mobile device is up-to-date.

How to Update Your Devices

The exact steps depend on your operating system. Here are the main ones.

Windows

  1. Open Settings (click the gear icon in the Start menu)
  2. Click Windows Update (or Update & Security on older versions)
  3. Click Check for updates
  4. If updates are available, click Download and install
  5. Restart when prompted
  6. After restart, go back to Windows Update β€” it should say “You’re up to date”

macOS

  1. Click the Apple menu (top-left corner) β†’ System Settings
  2. Click General β†’ Software Update
  3. If an update is available, click Update Now or Upgrade Now
  4. Enter your password and wait for the installation
  5. After restart, the Software Update screen should show your system is current

iPhone / iPad

  1. Open Settings β†’ General β†’ Software Update
  2. If an update is available, tap Download and Install
  3. Enter your passcode and agree to the terms
  4. The device will restart automatically
  5. To enable automatic updates: Settings β†’ General β†’ Software Update β†’ Automatic Updates β†’ toggle on

Android

  1. Open Settings β†’ System β†’ System Update (varies by manufacturer)
  2. Tap Check for update
  3. If available, tap Download and install
  4. The device will restart to complete the update

Update Demonstration Prep

Be ready to show your counselor these steps
  • Open the update settings on your device.
  • Check for available updates.
  • Show the current version number of your operating system.
  • Demonstrate that automatic updates are enabled (or enable them during the demonstration).
  • Show how to check for app updates in your app store.
Keep Your Device's Operating System and Applications Up to Date β€” CISA Official guidance from CISA on why and how to keep all your devices updated. Link: Keep Your Device's Operating System and Applications Up to Date β€” CISA β€” https://www.cisa.gov/resources-tools/training/keep-your-devices-operating-system-and-applications-date
Smartphone showing software update notification with icons for security patches, bug fixes, and new features

Req 5c β€” System Security

5c.
System security. With your parent or guardian’s permission, do THREE of the following using a computer or mobile device, and discuss with your counselor:

This is the hands-on heart of the Cybersecurity merit badge. You will pick three of the nine options below and actually do them β€” not just read about them. Each option teaches a different practical security skill. Read through all nine, then choose the three that interest you most or that you have access to complete.


Option 1: Strong Passwords

5c1.
Describe what makes a good password and why. Set or change an account password to one that is “strong.”

A strong password is your first defense against unauthorized access. Here is what makes one strong:

  • Length matters most. A 16-character password is exponentially harder to crack than an 8-character one. Aim for at least 12 characters, ideally 16 or more.
  • Use a passphrase. String together random, unrelated words: “correct-horse-battery-staple” is much stronger (and easier to remember) than “P@ssw0rd123.”
  • Mix character types. Include uppercase, lowercase, numbers, and symbols β€” but length is more important than complexity.
  • Never reuse passwords. If one site gets breached, every account sharing that password is compromised.

Avoid: Your name, birthday, pet’s name, “password,” “123456,” or any single dictionary word.


Option 2: Multi-Factor Authentication (MFA)

5c2.
Describe multi-factor authentication (MFA) and how it can be used to improve security. Demonstrate how to use an authenticator app or other MFA function.

MFA requires two or more forms of proof before granting access. The three factors are:

  1. Something you know β€” a password or PIN
  2. Something you have β€” your phone (with an authenticator app) or a security key
  3. Something you are β€” a fingerprint, face scan, or other biometric

Even if an attacker steals your password, they cannot get in without the second factor. Authenticator apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes that change every 30 seconds.


Option 3: Password Manager

5c3.
Install and set up a password manager. Demonstrate how it works to your counselor.

A password manager stores all your passwords in an encrypted vault protected by one strong master password. It can generate unique, complex passwords for every account and auto-fill them when you log in.

Popular free options include Bitwarden (open source) and the built-in password managers in Chrome, Safari, and Firefox. With a password manager, you only need to remember one password β€” the master password β€” and every other account gets a unique, randomly generated one.


Option 4: Virus Scan

5c4.
Run a virus scan. Show the results to your counselor.

Run a full system scan using your device’s built-in antivirus (Windows Defender on Windows, XProtect on macOS) or a reputable third-party scanner. A full scan examines every file on your device and compares it against known malware signatures.

Before scanning, make sure your antivirus definitions are up to date. The scan may take anywhere from 15 minutes to over an hour depending on how many files you have. Screenshot or save the results to show your counselor.


Option 5: Running Processes

5c5.
Using a command line or other built-in tool, see what programs or processes are running on your computer. Discuss with your counselor what you see and what surprises you.

Your computer runs dozens (sometimes hundreds) of processes simultaneously β€” most of them in the background without you knowing. This option teaches you to peek behind the curtain.

  • Windows: Open Task Manager (Ctrl+Shift+Esc) or type tasklist in Command Prompt
  • macOS: Open Activity Monitor (Applications β†’ Utilities) or type ps aux in Terminal
  • Chrome OS: Press Search+Escape to open Task Manager

Look for processes you recognize (your browser, games) and ones you do not. Research any unfamiliar ones β€” they are usually legitimate system processes, but knowing how to check is an important security skill.


Option 6: Network Connections

5c6.
Use a command line interface to view your computer’s open network connections. Discuss the results with your counselor.

Every program that communicates over the internet opens a network connection. You can see all active connections using the command line:

  • Windows: Open Command Prompt and type netstat -an
  • macOS/Linux: Open Terminal and type netstat -an or lsof -i

The output shows which programs are connected to which remote servers, on which ports. You will see your browser’s connections to websites, your email client checking for new mail, and potentially background services you did not expect.


Option 7: Data Backup

5c7.
Demonstrate how to back up your data from a mobile device to a local computer or the cloud.

Backups are your last line of defense against ransomware, hardware failure, and accidental deletion. If your data exists in only one place, it is not safe.

  • iPhone: Use iCloud Backup (Settings β†’ your name β†’ iCloud β†’ iCloud Backup) or connect to a computer and use Finder/iTunes
  • Android: Use Google Backup (Settings β†’ System β†’ Backup) or connect via USB and copy files manually

Show your counselor the backup process and verify that the backup completed successfully.


Option 8: Home Network Security Checklist

5c8.
Research best practices for protecting a home computer or network, and make a checklist of FIVE things you and your family can do to stay secure.

Research home network security from sources like CISA, the NSA, and the FTC (links below). Then create a practical checklist your family can actually follow. Your five items might include changing the default router password, enabling WPA3 encryption, setting up a guest network, enabling automatic updates, or disabling remote management.

Home Network Security β€” CISA CISA's comprehensive guide to securing your home network against common threats. Link: Home Network Security β€” CISA β€” https://www.cisa.gov/news-events/news/home-network-security Best Practices for Securing Your Home Network β€” NSA The NSA's home network security guide with practical recommendations for families. Link: Best Practices for Securing Your Home Network β€” NSA β€” https://media.defense.gov/2023/Feb/22/2003165170/-1/-1/0/CSI_BEST_PRACTICES_FOR_SECURING_YOUR_HOME_NETWORK.PDF

Option 9: Find and Fix a Vulnerability

5c9.
Identify one or more other vulnerabilities on your home computer or network or another computer or network you have permission to use and discuss with your counselor. With permission from the system owner, take the necessary actions to fix it.

This is the most advanced option. Look for real vulnerabilities in your own environment β€” a router with the default password, an old device that is not getting updates, a shared account without MFA, or an unused service that is still running. With permission, fix what you find and document what you did.

Choosing Your Three

Pick options that you have the equipment and access to complete. Here is a suggested combination if you are unsure:

  • Option 1 (passwords) + Option 2 (MFA) + Option 3 (password manager) β€” a natural trio that builds a complete authentication security system
  • Option 4 (virus scan) + Option 5 (processes) + Option 6 (network connections) β€” a trio focused on understanding what is happening on your computer
  • Option 7 (backup) + Option 8 (home network) + Option 9 (find a vulnerability) β€” a trio that protects your whole household
A teenager at a computer with floating panels showing a password manager, authenticator app, and terminal with running processes
Cryptography

Req 6a β€” Encryption Uses

6a.
Research and explain to your counselor three situations where encryption is used in cybersecurity. For each situation, describe what kind of encryption is used and why it is important.

Encryption is the art of turning readable information into scrambled nonsense that only authorized people can unscramble. It has been used for thousands of years β€” Julius Caesar shifted letters in his military messages, and the Enigma machine encrypted Nazi communications in World War II. Today, encryption is everywhere. Every time you see a padlock icon in your browser, encryption is at work.

How Encryption Works (The Short Version)

Encryption uses a key (a piece of mathematical information) to scramble data. Only someone with the correct key can unscramble it. There are two main approaches:

  • Symmetric encryption β€” the same key encrypts and decrypts the data. Fast, but both parties must share the key somehow. Think of it as a lockbox where both people have identical keys.
  • Asymmetric encryption (public-key cryptography) β€” uses two mathematically linked keys: a public key (which anyone can see) and a private key (which only you have). Data encrypted with the public key can only be decrypted with the private key. This solves the key-sharing problem.

Three Situations Where Encryption Is Used

Here are several real-world situations to consider for your counselor discussion. You need three β€” research these or find your own.

1. HTTPS Web Browsing

Every time you visit a website with “https://” in the URL and a padlock icon, your connection is encrypted using TLS (Transport Layer Security). This prevents anyone between you and the website β€” your ISP, a hacker on the same Wi-Fi, or a government β€” from reading the data you exchange.

  • What is encrypted: Everything you send and receive β€” login credentials, form submissions, page content, cookies
  • Type of encryption: Uses asymmetric encryption to establish the connection, then switches to faster symmetric encryption (usually AES) for the actual data transfer
  • Why it matters: Without HTTPS, logging into your email on public Wi-Fi would be like shouting your password across a crowded room

You will explore this hands-on in Req 6b.

2. Messaging Apps (End-to-End Encryption)

Apps like Signal, WhatsApp, and iMessage use end-to-end encryption (E2EE), which means messages are encrypted on your device and only decrypted on the recipient’s device. Not even the app company can read your messages.

  • What is encrypted: Text messages, photos, videos, voice calls β€” everything sent through the app
  • Type of encryption: Asymmetric encryption (each user has a public/private key pair). The Signal Protocol is the standard used by most major messaging apps.
  • Why it matters: Without E2EE, the company running the messaging service could read your private conversations, and a breach of their servers would expose every message

3. Full-Disk Encryption

Full-disk encryption scrambles everything on your hard drive or phone storage. If someone steals your device, they cannot read your files without your password β€” even if they remove the hard drive and connect it to another computer.

  • What is encrypted: The entire storage device β€” all files, apps, and system data
  • Type of encryption: Symmetric encryption (usually AES-256). Your password or biometric unlocks the decryption key stored in a secure hardware chip.
  • Why it matters: Without full-disk encryption, a stolen laptop is an open book. With it, a stolen laptop is a brick.
  • Where you see it: BitLocker (Windows), FileVault (macOS), and default encryption on modern iPhones and Android devices

Other Situations to Consider

  • VPN connections β€” encrypt all internet traffic between your device and the VPN server (as discussed in Req 5a)
  • Password storage β€” password managers encrypt your password vault with AES-256
  • Digital signatures β€” prove that a document or software update genuinely came from its claimed source and has not been tampered with
  • Email encryption β€” PGP/GPG encrypts email messages so only the intended recipient can read them (covered in Req 6c)
  • Cloud storage β€” services like iCloud and Google Drive encrypt your files at rest on their servers

Preparing for Your Counselor

For each of your three situations, be ready to explain:

  1. What data is being protected and from whom
  2. What type of encryption is used (symmetric, asymmetric, or both)
  3. Why encryption is important in that specific situation β€” what would happen without it?
The Need for Encryption β€” Khan Academy Interactive lessons on why encryption exists, how it works, and where it is used in everyday life. Link: The Need for Encryption β€” Khan Academy β€” https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-technique
Diagram comparing symmetric encryption (one shared key) and asymmetric encryption (public and private key pair)

Req 6b β€” Encrypted Connections

6b.
Show how you can know if your connection to a website is encrypted.

Every modern browser gives you clear visual signals about whether your connection is encrypted. Learning to read these signals takes about 30 seconds β€” and it is a habit that will protect you for life.

The Padlock Icon

The most visible indicator is the padlock icon in your browser’s address bar. When you see it, your connection to that website is encrypted using TLS (Transport Layer Security).

  • Padlock present β€” your connection is encrypted. Data you send (passwords, form submissions, credit card numbers) is protected in transit.
  • No padlock / “Not Secure” warning β€” the connection is not encrypted. Anything you type can potentially be intercepted by someone on the same network.

HTTPS vs. HTTP

The encryption status is also visible in the URL itself:

  • https:// β€” the “s” stands for “secure.” This connection is encrypted.
  • http:// β€” no encryption. Data is sent in plain text.

Modern browsers are moving toward hiding the “https://” prefix because it is so common, but you can usually click on the address bar to see the full URL.

Viewing Certificate Details

Clicking the padlock icon reveals more information about the encryption:

  1. Click the padlock in your browser’s address bar
  2. Look for “Connection is secure” or similar text
  3. Click for more details to see the certificate information

The certificate tells you:

  • Who issued it β€” a Certificate Authority (CA) like Let’s Encrypt, DigiCert, or Comodo verified that the website owner is who they claim to be
  • Who it was issued to β€” the domain name the certificate covers
  • When it expires β€” certificates must be renewed regularly
  • The encryption strength β€” typically TLS 1.2 or 1.3 with AES-256

What Encrypted Connections Do and Do Not Protect

Encrypted connections protect:

  • Data in transit between your device and the server (passwords, messages, financial info)
  • The integrity of the data (it cannot be modified without detection)
  • Privacy from eavesdroppers on the same network

Encrypted connections do NOT protect you from:

  • Phishing sites. A fake website can have a padlock and HTTPS. The padlock means the connection is encrypted, not that the website is trustworthy. A scammer’s site can get a certificate just as easily as a legitimate one.
  • Malware on the site. An encrypted connection to a malicious website still delivers malware.
  • Data the website collects. Encryption protects data in transit, but once it reaches the server, the website can do whatever its privacy policy allows with it.

Demonstrating for Your Counselor

Show your counselor the following:

  1. The padlock icon on a website and what happens when you click it
  2. The difference between https:// and http:// in the address bar
  3. The certificate details β€” who issued it, who it is for, and when it expires
  4. Explain that HTTPS alone does not guarantee a site is trustworthy (just that the connection is encrypted)
HTTP Secure (HTTPS) β€” Khan Academy Learn how HTTPS works and why it matters for protecting your online activity. Link: HTTP Secure (HTTPS) β€” Khan Academy β€” https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-technique
Browser address bar showing padlock icon and HTTPS URL with expanded certificate information panel

Req 6c β€” Crypto Hands-On

6c.
Do ONE of the following:

This is where cryptography stops being theory and becomes something you can touch. Pick one of the four options below β€” each one lets you work with real encryption tools and see how they function.


Option 1: Create Your Own Cipher

6c1.
Create your own encryption code, such as a substitution cipher or code book, and demonstrate using it to encrypt and decrypt a message. Describe the strengths and weaknesses of your code.

A substitution cipher replaces each letter with a different letter, number, or symbol. The simplest version is the Caesar cipher β€” shift every letter by a fixed number of positions. If you shift by 3, A becomes D, B becomes E, and so on.

To make your cipher more interesting, try:

  • A random substitution where each letter maps to a random different letter (not just a shifted alphabet)
  • A code book where entire words map to code words or numbers
  • A VigenΓ¨re cipher that uses a keyword to shift each letter by a different amount

Strengths to discuss: Anyone without the key cannot easily read the message; the more random the substitution, the harder to crack.

Weaknesses to discuss: Simple substitution ciphers can be broken with frequency analysis β€” in English, the letter “E” appears most often, so the most common symbol in your encrypted message is probably “E.” Modern computers can crack these in seconds.


Option 2: End-to-End Encrypted Messaging

6c2.
Download and set up an app (from an official app store) that uses end-to-end encryption. Explain to your counselor what this means, how it works, and why it is more secure than other forms of communication (e.g. SMS).

End-to-end encryption (E2EE) means that messages are encrypted on your device and can only be decrypted on the recipient’s device. Nobody in between β€” not the app company, not your internet provider, not a hacker β€” can read the message.

Apps with E2EE include Signal (widely considered the gold standard for secure messaging), WhatsApp, and iMessage (between Apple devices).

Why E2EE is more secure than SMS:

  • SMS text messages are sent in plain text across cell towers β€” they can be intercepted
  • Your carrier stores SMS messages on their servers
  • SMS is vulnerable to SIM swapping attacks
  • E2EE messages cannot be read even if the server is breached

For your counselor, install Signal or another E2EE app (with parental permission), send a test message, and explain how the encryption works behind the scenes.


Option 3: Hashing and Checksums

6c3.
Use a hashing tool (for example, using SHA or MD5) to create a checksum for a file, document, or piece of text. Have a fellow Scout or your counselor make a change to it, then recreate the checksum and compare the new checksum to the original as a demonstration of file integrity checking.

A hash is a fixed-size digital fingerprint of data. Feed any file β€” no matter how large β€” through a hashing algorithm, and it produces a unique string of characters. Change even a single character in the file, and the hash changes completely. This makes hashing perfect for verifying that data has not been tampered with.

How to create a hash:

  • Windows: Open Command Prompt and type certutil -hashfile filename SHA256
  • macOS/Linux: Open Terminal and type shasum -a 256 filename
  • Online: Use a tool like tools4noobs.com/online_tools/hash/

The demonstration:

  1. Create a text file with a message
  2. Generate the SHA-256 hash
  3. Have your counselor or a fellow Scout change one character in the file
  4. Generate the hash again
  5. Compare the two hashes β€” they will be completely different, even though only one character changed

Option 4: PGP Email Encryption

6c4.
Create your own PGP (pretty good privacy) email key. Share your public key with others (and your counselor). Also, get their public keys and add them to your computer’s key ring. Send a message that has been digitally encrypted.

PGP (Pretty Good Privacy) uses public-key cryptography to encrypt emails. You create a key pair β€” a public key that anyone can use to encrypt messages to you, and a private key that only you have to decrypt those messages.

Steps:

  1. Install GPG software (Gpg4win for Windows, GPG Suite for macOS, or use the command line gpg tool)
  2. Generate your key pair
  3. Export your public key and share it with your counselor
  4. Import your counselor’s public key
  5. Encrypt a message using their public key and send it
  6. Decrypt a message they send you using your private key

This is the most advanced option and gives you direct experience with asymmetric encryption β€” the same concept that secures HTTPS connections and cryptocurrency transactions.

Encryption, Decryption, and Code Cracking β€” Khan Academy Interactive exercises on encryption techniques from basic ciphers to modern cryptography. Link: Encryption, Decryption, and Code Cracking β€” Khan Academy β€” https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking
A colorful cipher wheel with outer and inner alphabet rings offset for encoding and decoding messages
Connected World

Req 7 β€” IoT Devices

7.
Connected Devices and Internet of Things (IoT). Describe to your counselor four electronic devices you encounter that could be connected to the internet, why this connectivity can be useful, what risks are posed by the connectivity, and how they could be protected.

Your refrigerator can order groceries. Your doorbell can send video to your phone. Your watch can track your heartbeat and upload it to the cloud. Welcome to the Internet of Things (IoT) β€” the network of everyday objects connected to the internet. It is incredibly useful and incredibly risky at the same time.

What Is the Internet of Things?

The IoT is the expanding universe of physical devices β€” beyond traditional computers and phones β€” that connect to the internet to send, receive, or process data. There are already more IoT devices on Earth than people, and the number is growing by billions each year.

These devices often have limited computing power, minimal security features, and rarely receive software updates after they are sold. This makes them prime targets for attackers β€” as you learned in Req 3a when discussing the Mirai botnet, which hijacked hundreds of thousands of IoT devices.

Four IoT Devices to Consider

Here are examples organized by where you might encounter them. Choose four that you actually see in your life β€” your counselor will be more interested in devices you can speak about from personal experience.

Smart Home Devices

Smart speakers and voice assistants (Amazon Echo, Google Home, Apple HomePod):

  • Usefulness: Voice-controlled music, timers, weather, smart home control, homework help
  • Risks: Always-on microphones that could be exploited to eavesdrop; voice data stored on company servers; could be used to unlock other smart home features without proper authentication
  • Protection: Review and delete voice recordings regularly; mute the microphone when not in use; disable purchasing features; keep firmware updated

Smart thermostats and home automation (Nest, Ecobee):

  • Usefulness: Save energy by learning your schedule; remote control from your phone; integrate with other smart home systems
  • Risks: Reveal when your home is occupied or empty (useful to burglars); could be hijacked to change heating/cooling to extreme levels; part of the larger attack surface on your home network
  • Protection: Use strong, unique passwords; keep on a separate Wi-Fi network; update firmware regularly

Wearable Devices

Fitness trackers and smartwatches (Apple Watch, Fitbit, Garmin):

  • Usefulness: Track health metrics, navigate, receive notifications, emergency SOS features
  • Risks: Collect sensitive health data (heart rate, sleep patterns, menstrual cycles); GPS tracking reveals precise location history and exercise routes; data shared with third-party apps
  • Protection: Review app permissions; disable location sharing for fitness apps when possible; use strong authentication; review what data is shared with third parties

Security Devices

Smart cameras and doorbells (Ring, Nest Cam, Arlo):

  • Usefulness: Monitor your home remotely, see who is at the door, record security footage
  • Risks: If hacked, attackers can watch your home in real-time; footage stored in the cloud could be accessed in a breach; some devices have had vulnerabilities allowing strangers to view cameras
  • Protection: Change default passwords immediately; enable two-factor authentication; keep firmware updated; consider using cameras with local (not cloud) storage

Gaming and Entertainment

Gaming consoles (Xbox, PlayStation, Nintendo Switch):

  • Usefulness: Online multiplayer gaming, streaming media, voice and video chat with friends
  • Risks: Linked to payment methods (credit cards, gift cards); online interactions with strangers; voice chat can expose personal information; account theft is common in gaming
  • Protection: Use unique, strong passwords; enable MFA on your gaming accounts; do not share account credentials; monitor linked payment methods; enable parental controls where appropriate

Other IoT Devices to Consider

  • Smart TVs β€” connected to streaming accounts, may have cameras and microphones
  • Connected cars β€” GPS tracking, remote start, cellular connectivity
  • Smart appliances β€” refrigerators, ovens, washing machines with Wi-Fi
  • Medical devices β€” insulin pumps, pacemakers, health monitors
  • Smart toys β€” connected stuffed animals and games that record conversations

General IoT Protection Rules

No matter which four devices you discuss, these principles apply to all of them:

IoT Security Basics

Apply these to every connected device
  • Change default passwords: Factory-set passwords are publicly known. Change them immediately.
  • Keep firmware updated: Check for updates regularly β€” many IoT devices do not update automatically.
  • Use a separate network: Put IoT devices on a guest Wi-Fi network so a compromised device cannot reach your computers and phones.
  • Disable unused features: If you do not use voice control or remote access, turn it off. Every feature is a potential entry point.
  • Research before buying: Check whether the manufacturer provides regular security updates and for how long.
What Is the Internet of Things (IoT)? β€” IBM A comprehensive overview of IoT technology, applications, and security considerations from IBM. Link: What Is the Internet of Things (IoT)? β€” IBM β€” https://www.ibm.com/think/topics/internet-of-things
Cutaway house showing IoT devices in different rooms connected by dotted lines to a central Wi-Fi router
Hands-On Challenge

Req 8 β€” Cybersecurity Activities

8.
Cybersecurity Activities. Do ONE of the following:

This requirement takes everything you have learned and puts it into action. Choose one of the three options β€” learning about a competition, participating in one, or giving a presentation.


Option A: Learn About a Competition or Activity

8a.
Learn about a cybersecurity competition, camp, or other activity you could participate in (either now or in the future). Share what you learned with your counselor, including the type of activity, time commitment, and age of participants.

The cybersecurity community runs competitions and activities specifically designed for young people. Here are some of the most well-known:

CyberPatriot β€” The premier youth cyber defense competition, run by the Air & Space Forces Association. Teams of students defend virtual computer networks against simulated attacks. The competition runs from October through March, with regional and national finals.

  • Ages: Middle school and high school students
  • Time commitment: Weekly practice sessions plus competition rounds (each round is about 6 hours)
  • Cost: Registration fee per team (varies, often covered by sponsors)

picoCTF β€” A free online Capture The Flag competition from Carnegie Mellon University. Participants solve cybersecurity challenges ranging from beginner to expert. “Capture The Flag” (CTF) competitions are the most popular format in cybersecurity β€” you solve puzzles that test hacking, cryptography, forensics, and web security skills.

  • Ages: Middle and high school students (anyone can practice year-round)
  • Time commitment: The competition runs for about two weeks; practice challenges are available anytime
  • Cost: Free

AFA CyberCamps β€” Week-long camps that teach cybersecurity fundamentals, often culminating in a mini-competition. Available in many states across the country.

National Cyber League (NCL) β€” A biannual CTF competition focused on building real-world cybersecurity skills. Has individual and team-based seasons.

CyberPatriot β€” National Youth Cyber Defense Competition The premier youth cyber defense competition. Learn about teams, seasons, and how to register. Link: CyberPatriot β€” National Youth Cyber Defense Competition β€” https://www.uscyberpatriot.org/ picoCTF β€” Free Cybersecurity Competition A free, beginner-friendly Capture The Flag competition from Carnegie Mellon University with year-round practice challenges. Link: picoCTF β€” Free Cybersecurity Competition β€” https://picoctf.org/

Option B: Participate in a Competition

8b.
Participate in a cybersecurity competition with members of your troop, school, or some other group approved by your counselor. Either design your own competition or use an existing platform.

If you choose this option, you need to actually compete β€” either using an existing platform or creating your own challenge for your troop.

Using an existing platform:

  • picoCTF practice β€” set up a team challenge night with your patrol or troop, working through beginner challenges together
  • Cyber Threat Defender β€” a card game from UTSA that teaches cybersecurity concepts through gameplay
  • NCF Cybersecurity Gaming Series β€” online games that test cybersecurity knowledge

Designing your own:

  • Create a series of challenges for your troop meeting: password strength tests, phishing email identification, a cipher decoding race
  • Set up a scavenger hunt where teams find and fix security issues on practice systems
  • Run a “spot the phish” competition using real examples of phishing emails (with personal info redacted)

Option C: Give a Presentation

8c.
Give a presentation to your patrol, troop, or another group approved by your counselor, on a cybersecurity topic of your choice. Your presentation must include at least one demonstration and/or hands-on activity.

This option develops your communication skills alongside your technical knowledge. A good presentation teaches others what you have learned.

Topic ideas:

  • How to create strong passwords (demo: use a password strength checker to compare weak vs. strong passwords)
  • Recognizing phishing emails (demo: show real examples and have the audience identify red flags)
  • Setting up multi-factor authentication (demo: walk through the setup process live)
  • How encryption works (demo: encode and decode messages with a cipher)
  • Public Wi-Fi safety (demo: show how to verify HTTPS and use a VPN)

Presentation tips:

Presentation Checklist

Make your presentation effective and engaging
  • Keep it under 15 minutes: Your audience will lose focus after that.
  • Start with a hook: A surprising fact or real-world incident grabs attention immediately.
  • Include visuals: Screenshots, diagrams, or live demonstrations keep people engaged.
  • Make it hands-on: Give the audience something to do β€” solve a cipher, identify a phishing email, check their own password strength.
  • End with action items: Give three specific things the audience can do today to improve their security.
K-12 Cybersecurity Games β€” UTSA CIAS Free cybersecurity games and activities designed for K-12 students, perfect for troop presentations or competitions. Link: K-12 Cybersecurity Games β€” UTSA CIAS β€” https://cias.utsa.edu/k-12/cybersecurity-games/
Four teenagers gathered around laptops in a CTF-style cybersecurity competition with a scoreboard in the background
Career Exploration

Req 9 β€” Careers

9.
Careers. Do ONE of the following:

Cybersecurity has a massive workforce shortage β€” there are hundreds of thousands of unfilled cybersecurity jobs in the United States alone. This means opportunity for you. Whether you choose Option A or B, you will discover that cybersecurity careers are diverse, well-paying, and in extremely high demand.


Option A: Research a Career

9a.
Identify three career opportunities that would use skills and knowledge in cybersecurity. Pick one and research the training, education, certification requirements, experience, and expenses associated with entering the field. Research the prospects for employment, starting salary, advancement opportunities and career goals associated with this career. Discuss what you learned with your counselor and whether you might be interested in this career.

Here are cybersecurity career paths to consider. Choose three that interest you, then deep-dive into one.

Security Analyst β€” The front-line defender. Security analysts monitor networks and systems for suspicious activity, investigate alerts, and respond to incidents. This is often the entry point into cybersecurity careers.

  • Education: Bachelor’s degree in cybersecurity, computer science, or related field (some roles accept certifications in lieu of a degree)
  • Certifications: CompTIA Security+, Certified Ethical Hacker (CEH)
  • Starting salary: $60,000–$85,000
  • Growth: Can advance to senior analyst, security engineer, or security architect

Penetration Tester (Ethical Hacker) β€” Hired to break into systems on purpose. “Pen testers” think like attackers, finding vulnerabilities before real hackers do. Companies pay them to attack their own networks, then fix what they find.

  • Education: Bachelor’s degree or equivalent experience; strong technical skills matter most
  • Certifications: OSCP (Offensive Security Certified Professional), CEH, GPEN
  • Starting salary: $70,000–$100,000
  • Growth: Senior pen tester, red team lead, security consultant

Digital Forensics Investigator β€” The cyber detective. Forensics investigators examine digital evidence after a breach or crime β€” recovering deleted files, tracing attack paths, and preserving evidence for legal proceedings.

  • Education: Bachelor’s in cybersecurity, computer science, or criminal justice
  • Certifications: GCFE, EnCE, CFCE
  • Starting salary: $55,000–$80,000
  • Growth: Senior investigator, forensics manager, expert witness

Other careers to explore:

  • Security Engineer β€” designs and builds secure systems
  • Chief Information Security Officer (CISO) β€” leads an organization’s entire security program
  • Cryptographer β€” develops encryption algorithms and protocols
  • Incident Responder β€” the first to arrive when a breach happens, containing damage and investigating
  • Security Software Developer β€” writes the tools that other security professionals use
  • Threat Intelligence Analyst β€” researches emerging threats and predicts future attack trends

Research Framework

When researching your chosen career, cover these areas:

Career Research Guide

Answer these questions for your chosen career
  • Training and education: What degree(s) or training programs are recommended? Are boot camps or self-study paths viable alternatives?
  • Certifications: Which certifications are required or preferred? What do they cost? How long do they take?
  • Experience: What entry-level experience is needed? Are internships, apprenticeships, or lab work available?
  • Starting salary: What can you expect to earn in your first role?
  • Advancement: What does the career ladder look like? What positions can this role grow into?
  • Work environment: Office, remote, government, private sector, military?
  • Day-to-day: What does a typical workday look like? What tools and technologies are used?

Option B: Visit a Cybersecurity Organization

9b.
Visit a business or organization that does work in cybersecurity. Find out about different work roles, what they do, and how they acquired their knowledge through college degrees or certifications. Share what you learned with your counselor.

If you choose this option, look for organizations in your area:

  • Technology companies with security teams
  • Government agencies (many have public outreach programs)
  • Military installations with cybersecurity units
  • Banks and financial institutions (they have large security operations)
  • Hospitals and healthcare systems (cybersecurity is critical for patient data protection)
  • Universities with cybersecurity programs or research labs
  • Managed Security Service Providers (MSSPs) β€” companies that provide security services to other businesses

During your visit, ask about:

  • The different roles on their security team
  • How team members got into cybersecurity (education, career changers, military background)
  • What a typical day looks like
  • What certifications they recommend for someone starting out
  • What skills matter most beyond technical knowledge (communication, problem-solving, teamwork)

Paths for Young People Right Now

You do not have to wait for college to start building cybersecurity skills:

  • CyberPatriot β€” competitive experience that looks great on college applications
  • picoCTF β€” free, self-paced challenges that build real skills
  • CompTIA ITF+ and Security+ β€” certifications available to high school students
  • Cisco Networking Academy β€” free online courses in networking and cybersecurity
  • Scholarship programs β€” organizations like CyberCorps offer full scholarships for cybersecurity students who commit to government service after graduation
Careers in Cybersecurity β€” CompTIA Future of Tech Explore cybersecurity career paths, required skills, and how to get started in the field. Link: Careers in Cybersecurity β€” CompTIA Future of Tech β€” https://www.futureoftech.org/cybersecurity/6-careers-in-cybersecurity/ Degrees & Certifications β€” Cyber.org Learn about the education and certification pathways into cybersecurity careers. Link: Degrees & Certifications β€” Cyber.org β€” https://cyber.org/career-exploration/degrees-certifications
Career progression infographic showing paths from Entry Level to Security Analyst, Penetration Tester, Forensics Investigator, Security Engineer, and CISO
Beyond the Badge

Extended Learning

A. Congratulations

You have earned the Cybersecurity merit badge β€” and with it, a skill set that most adults wish they had. You can explain the CIA Triad, spot phishing emails, create strong passwords, understand encryption, and map an attack surface. These are not abstract concepts. They are tools you will use every time you go online for the rest of your life. The world needs more people who understand cybersecurity, and now you are one of them.

What follows are opportunities to go deeper β€” to move from understanding cybersecurity to genuinely mastering it.

B. Social Engineering: Hacking the Human

Every technical defense in the world can be bypassed if an attacker can convince the right person to open the door. Social engineering is the art of manipulating people β€” not machines β€” to gain access to systems, data, or physical spaces. It is the single most effective attack vector, and it was only briefly touched in the merit badge requirements.

Social engineering works because it exploits universal human traits: trust, helpfulness, urgency, fear, and curiosity. A well-crafted social engineering attack does not need a single line of code.

Common Techniques

Pretexting involves creating a fabricated scenario to gain trust. An attacker might call a company’s help desk pretending to be a new employee who locked themselves out of their account. They sound flustered, they know the right jargon, and they just need a password reset β€” please, their boss is waiting. The help desk agent, wanting to be helpful, resets the password. The attacker is in.

Baiting uses curiosity or greed. A USB drive labeled “Confidential β€” Employee Salaries” is left in a company parking lot. Someone picks it up and plugs it into their work computer to see what is on it. The drive contains malware that installs itself immediately. Security researchers have tested this β€” in one study, 48% of dropped USB drives were plugged into computers.

Tailgating (or piggybacking) is following an authorized person through a secured door. Holding a stack of boxes and asking someone to hold the door is usually enough. Most people are too polite to ask for credentials.

Quid pro quo offers something in exchange for information. “Hi, this is IT support. We are running diagnostics and need your password to verify your account is working properly.” The attacker offers help (the quid) in exchange for credentials (the quo).

Why It Matters

You might have the strongest password in the world, two-factor authentication on everything, and a fully updated system β€” but if someone convinces you to hand over your credentials through a convincing phone call, none of those defenses matter. The best cybersecurity practitioners understand that the human element is always the weakest link, and they train accordingly.

The next time someone asks you for information that seems slightly off β€” even if they claim to be from a legitimate organization β€” pause. Verify independently. Call the organization directly using a number you look up yourself, not one the caller provides. Social engineering only works when targets act on emotion instead of logic.

C. How the Internet Actually Works

You use the internet every day, but understanding what happens between pressing Enter and seeing a web page load gives you a huge advantage in cybersecurity. Every attack and defense makes more sense when you understand the underlying infrastructure.

The Journey of a Web Request

When you type a URL into your browser, here is what happens in about 200 milliseconds:

  1. DNS Resolution β€” Your computer asks a Domain Name System (DNS) server to translate the human-readable domain (like “google.com”) into an IP address (like 142.250.80.46). DNS is the internet’s phone book. If an attacker poisons a DNS server, they can redirect your browser to a fake website without changing the URL β€” this is one form of DNS spoofing.

  2. TCP Connection β€” Your computer establishes a connection with the web server using the TCP protocol, which involves a “three-way handshake” (SYN, SYN-ACK, ACK). This handshake ensures both sides are ready to communicate. DDoS attacks often exploit this step by flooding servers with SYN requests without completing the handshake.

  3. TLS Handshake β€” If the site uses HTTPS (which you learned to check in Req 6b), your browser and the server negotiate encryption. They exchange certificates, agree on encryption algorithms, and establish a shared secret key. This is where the certificate verification you explored becomes critical.

  4. HTTP Request/Response β€” Your browser sends a request for the web page, and the server responds with HTML, CSS, JavaScript, and images. All of this happens inside the encrypted TLS tunnel.

  5. Rendering β€” Your browser assembles the response into the web page you see.

Understanding this chain reveals where attacks can happen: DNS (spoofing), TCP (DDoS), TLS (certificate forgery), and HTTP (injection attacks). Every concept from your merit badge maps to a specific step in this process.

Ports and Protocols

Network communication uses ports β€” numbered channels for different types of traffic. When you looked at network connections in Req 5c option 6, the numbers after the colon in each connection (like :443 or :80) are ports. Port 80 is HTTP, port 443 is HTTPS, port 22 is SSH (secure remote access), and port 25 is email. Firewalls work by controlling which ports are open or closed, letting legitimate traffic through and blocking suspicious connections on unusual ports.

D. Bug Bounties and Responsible Disclosure

Many of the world’s largest companies β€” Google, Microsoft, Apple, Facebook, and hundreds of others β€” will pay you cash for finding security vulnerabilities in their products. These programs are called bug bounties, and they represent a legitimate, legal, and sometimes very lucrative path for people with cybersecurity skills.

How Bug Bounties Work

A company publishes a set of rules (called a “scope”) that describes what you are allowed to test and what is off-limits. You search for vulnerabilities within the scope. If you find one, you report it privately to the company through their bug bounty platform. The company verifies the vulnerability, fixes it, and pays you a reward based on its severity.

Platforms like HackerOne and Bugcrowd manage bug bounty programs for hundreds of companies. Payouts range from a few hundred dollars for minor issues to over $100,000 for critical vulnerabilities. Google’s bug bounty program has paid out over $50 million to researchers worldwide.

Responsible Disclosure

Bug bounties are built on the principle of responsible disclosure β€” the ethical framework you explored in Req 2b. When you find a vulnerability, you report it privately to the company rather than publishing it or exploiting it. The company gets time to fix the issue before it becomes public knowledge. This is the cybersecurity community’s version of the Scout Law in action β€” being trustworthy and helpful even when you have the power to cause harm.

Getting Started

You do not need to be an expert to start. Many bug bounty platforms have beginner programs with reduced scope and guided tutorials. Combined with CTF experience from Req 8, you can start developing the skills to earn rewards while making the internet safer for everyone.

E. Real-World Experiences

Experiences to Seek Out

Hands-on opportunities to build cybersecurity skills
  • CyberPatriot competition: Join or form a team through your school or troop. The national competition runs October–March with regional and national finals.
  • picoCTF challenges: Work through the free online challenges at picoctf.org. Start with the “General Skills” and “Cryptography” categories.
  • Local cybersecurity meetups: Many cities have cybersecurity user groups that welcome students. Search Meetup.com for “cybersecurity” or “infosec” in your area.
  • College cybersecurity programs: Visit a university’s cybersecurity lab or attend an open house. Many schools offer summer camps or workshops for high school students.
  • GenCyber camps: Free summer cybersecurity camps funded by the NSA and NSF, available at universities across the country. Search “GenCyber” for locations near you.

F. Organizations

Cybersecurity and Infrastructure Security Agency (CISA) The U.S. government's lead cybersecurity agency. Offers free resources, training materials, alerts about current threats, and career information. Link: Cybersecurity and Infrastructure Security Agency (CISA) β€” https://www.cisa.gov/ CyberPatriot β€” Air & Space Forces Association The national youth cyber defense competition. Provides team-based competition experience, training resources, and pathways to cybersecurity careers and scholarships. Link: CyberPatriot β€” Air & Space Forces Association β€” https://www.uscyberpatriot.org/ Cyber.org A national cybersecurity education initiative offering free curricula, career exploration tools, and resources for students and educators. Link: Cyber.org β€” https://cyber.org/ National Cryptologic Foundation Educates the public about the role of cryptology in national security. Offers student programs, games, and the CyberChats podcast series on cybersecurity careers. Link: National Cryptologic Foundation β€” https://cryptologicfoundation.org/ SANS Institute The world's largest cybersecurity training organization. Offers CyberStart, a free program for high school students to develop security skills through guided challenges. Link: SANS Institute β€” https://www.sans.org/ ISCΒ² (International Information System Security Certification Consortium) The organization behind the CISSP certification. Offers free introductory cybersecurity courses and career resources through their 'Certified in Cybersecurity' entry-level program. Link: ISCΒ² (International Information System Security Certification Consortium) β€” https://www.isc2.org/