Requirement 7 of 9

Connected Devices and IoT

Describe connected devices you encounter, why their connectivity is useful, what risks it creates, and how they can be protected.

Sign in or create an account to mark steps complete and save your progress.

Checklist

Requirement 7 discussion guide

Use these notes to discuss internet-connected devices and how convenience and risk often increase together.

Examples of connected devices

  • Smartphones, smart TVs, video doorbells, game consoles, smart speakers, printers, cameras, watches, and home assistants can all connect to the internet.

Benefits and risks

What to discuss

  • Connectivity can add automation, remote access, convenience, alerts, and data sharing.
  • It can also create privacy risks, weak-password problems, outdated-firmware issues, and new paths for attackers.
  • Good protections include changing default passwords, updating firmware, disabling unused features, and limiting unnecessary access.

Connected Devices and IoT discussion locked

Sign in or create an account to mark progress complete.

Back: CryptographyNext: Cybersecurity Activities

Jump To A Requirement

Navigate anywhere in this merit badge without losing your place.

View Start Page