Requirement 6 of 9

Cryptography

Explain how encryption is used in cybersecurity, identify encrypted website connections, and complete one practical cryptography activity.

Sign in or create an account to mark steps complete and save your progress.

Checklist

Requirement 6 discussion guide

Use these notes to explain why encryption matters and where it appears in everyday cybersecurity.

Where encryption is used

  • Website connections can use HTTPS to encrypt data between your browser and the site.
  • Messaging apps may use end-to-end encryption so only the intended participants can read the messages.
  • Encrypted storage or backups help protect files if a device is lost or stolen.

Why encryption matters

Discussion points

  • Encryption helps keep information private from people who are not supposed to see it.
  • It is important because passwords, messages, personal data, and financial information often travel across shared networks.

Cryptography discussion locked

Sign in or create an account to mark progress complete.

How to recognize an encrypted website

Show how you can tell whether your connection to a website is encrypted.

What to look for

  • Look for `https://` at the beginning of the website address.
  • Most browsers also show a lock or other site-information icon near the address bar.

What it means

  • HTTPS means the connection between your browser and the site is encrypted in transit.
  • It does not automatically mean every part of the site is trustworthy, but it does mean the connection is protected better than plain HTTP.

How to recognize an encrypted website locked

Sign in or create an account to mark progress complete.

Choose 1 cryptography activity

Pick one cryptography activity and be ready to explain what you did, what worked well, and what limitations you noticed.

Select 1 activity

Choose one of the activity options below. When you pick one, this step will mark complete.

0 selected, 1 required

Sign in or create an account to choose items and save progress.

Select items above to show their notes here. Choose at least 1.

Choose 1 cryptography activity locked

Sign in or create an account to mark progress complete.

Back: Cyber DefensesNext: Connected Devices and IoT

Jump To A Requirement

Navigate anywhere in this merit badge without losing your place.

View Start Page