Cyber Defenses

Req 5c — System Security

5c.
System security. With your parent or guardian’s permission, do THREE of the following using a computer or mobile device, and discuss with your counselor:

This is the hands-on heart of the Cybersecurity merit badge. You will pick three of the nine options below and actually do them — not just read about them. Each option teaches a different practical security skill. Read through all nine, then choose the three that interest you most or that you have access to complete.


Option 1: Strong Passwords

5c1.
Describe what makes a good password and why. Set or change an account password to one that is “strong.”

A strong password is your first defense against unauthorized access. Here is what makes one strong:

Avoid: Your name, birthday, pet’s name, “password,” “123456,” or any single dictionary word.


Option 2: Multi-Factor Authentication (MFA)

5c2.
Describe multi-factor authentication (MFA) and how it can be used to improve security. Demonstrate how to use an authenticator app or other MFA function.

MFA requires two or more forms of proof before granting access. The three factors are:

  1. Something you know — a password or PIN
  2. Something you have — your phone (with an authenticator app) or a security key
  3. Something you are — a fingerprint, face scan, or other biometric

Even if an attacker steals your password, they cannot get in without the second factor. Authenticator apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes that change every 30 seconds.


Option 3: Password Manager

5c3.
Install and set up a password manager. Demonstrate how it works to your counselor.

A password manager stores all your passwords in an encrypted vault protected by one strong master password. It can generate unique, complex passwords for every account and auto-fill them when you log in.

Popular free options include Bitwarden (open source) and the built-in password managers in Chrome, Safari, and Firefox. With a password manager, you only need to remember one password — the master password — and every other account gets a unique, randomly generated one.


Option 4: Virus Scan

5c4.
Run a virus scan. Show the results to your counselor.

Run a full system scan using your device’s built-in antivirus (Windows Defender on Windows, XProtect on macOS) or a reputable third-party scanner. A full scan examines every file on your device and compares it against known malware signatures.

Before scanning, make sure your antivirus definitions are up to date. The scan may take anywhere from 15 minutes to over an hour depending on how many files you have. Screenshot or save the results to show your counselor.


Option 5: Running Processes

5c5.
Using a command line or other built-in tool, see what programs or processes are running on your computer. Discuss with your counselor what you see and what surprises you.

Your computer runs dozens (sometimes hundreds) of processes simultaneously — most of them in the background without you knowing. This option teaches you to peek behind the curtain.

Look for processes you recognize (your browser, games) and ones you do not. Research any unfamiliar ones — they are usually legitimate system processes, but knowing how to check is an important security skill.


Option 6: Network Connections

5c6.
Use a command line interface to view your computer’s open network connections. Discuss the results with your counselor.

Every program that communicates over the internet opens a network connection. You can see all active connections using the command line:

The output shows which programs are connected to which remote servers, on which ports. You will see your browser’s connections to websites, your email client checking for new mail, and potentially background services you did not expect.


Option 7: Data Backup

5c7.
Demonstrate how to back up your data from a mobile device to a local computer or the cloud.

Backups are your last line of defense against ransomware, hardware failure, and accidental deletion. If your data exists in only one place, it is not safe.

Show your counselor the backup process and verify that the backup completed successfully.


Option 8: Home Network Security Checklist

5c8.
Research best practices for protecting a home computer or network, and make a checklist of FIVE things you and your family can do to stay secure.

Research home network security from sources like CISA, the NSA, and the FTC (links below). Then create a practical checklist your family can actually follow. Your five items might include changing the default router password, enabling WPA3 encryption, setting up a guest network, enabling automatic updates, or disabling remote management.

Home Network Security — CISA CISA's comprehensive guide to securing your home network against common threats. Best Practices for Securing Your Home Network — NSA The NSA's home network security guide with practical recommendations for families.

Option 9: Find and Fix a Vulnerability

5c9.
Identify one or more other vulnerabilities on your home computer or network or another computer or network you have permission to use and discuss with your counselor. With permission from the system owner, take the necessary actions to fix it.

This is the most advanced option. Look for real vulnerabilities in your own environment — a router with the default password, an old device that is not getting updates, a shared account without MFA, or an unused service that is still running. With permission, fix what you find and document what you did.

Choosing Your Three

Pick options that you have the equipment and access to complete. Here is a suggested combination if you are unsure:

A teenager at a computer with floating panels showing a password manager, authenticator app, and terminal with running processes