Requirement 6 of 9
Cryptography
Explain how encryption is used in cybersecurity, identify encrypted website connections, and complete one practical cryptography activity.
Sign in or create an account to mark steps complete and save your progress.
Checklist
- 6a Research and explain three situations where encryption is used in cybersecurityNot complete
- 6b Show how you can know if your connection to a website is encryptedNot complete
- 6c Complete one cryptography activity such as a cipher, end-to-end encrypted app, hashing, or PGPNot complete
Requirement 6 discussion guide
Use these notes to explain why encryption matters and where it appears in everyday cybersecurity.
Where encryption is used
- Website connections can use HTTPS to encrypt data between your browser and the site.
- Messaging apps may use end-to-end encryption so only the intended participants can read the messages.
- Encrypted storage or backups help protect files if a device is lost or stolen.
Resources
Why encryption matters
Discussion points
- Encryption helps keep information private from people who are not supposed to see it.
- It is important because passwords, messages, personal data, and financial information often travel across shared networks.
Cryptography discussion locked
Sign in or create an account to mark progress complete.
How to recognize an encrypted website
Show how you can tell whether your connection to a website is encrypted.
What to look for
- Look for `https://` at the beginning of the website address.
- Most browsers also show a lock or other site-information icon near the address bar.
What it means
- HTTPS means the connection between your browser and the site is encrypted in transit.
- It does not automatically mean every part of the site is trustworthy, but it does mean the connection is protected better than plain HTTP.
Resource
How to recognize an encrypted website locked
Sign in or create an account to mark progress complete.
Choose 1 cryptography activity
Pick one cryptography activity and be ready to explain what you did, what worked well, and what limitations you noticed.
Select 1 activity
Choose one of the activity options below. When you pick one, this step will mark complete.
0 selected, 1 required
Sign in or create an account to choose items and save progress.
Select items above to show their notes here. Choose at least 1.
Choose 1 cryptography activity locked
Sign in or create an account to mark progress complete.
Jump To A Requirement
Navigate anywhere in this merit badge without losing your place.
View Start Page