Requirement 5 of 9

Cyber Defenses

Explain common defensive technologies, demonstrate updates, and complete three practical system-security activities.

Sign in or create an account to mark steps complete and save your progress.

Checklist

Requirement 5 discussion guide

Use these notes to explain common cyber defenses and why updates and layered protections matter.

Defense examples

  • Access controls limit who can log in or use certain features.
  • Antivirus and anti-malware tools look for harmful files or suspicious behavior.
  • Firewalls filter network traffic, while intrusion detection and prevention tools watch for signs of attack.
  • VPNs can help protect traffic on untrusted networks by encrypting connections between your device and a trusted service.

Why updates matter

Key points

  • Updates fix vulnerabilities, patch bugs, improve stability, and sometimes add new protections.
  • Outdated systems are easier targets because attackers often look for known weaknesses that have already been patched.

Cyber Defenses discussion locked

Sign in or create an account to mark progress complete.

Installing updates

Explain why updates matter and demonstrate how to check for and verify updates on a device you are allowed to use.

Why updates are needed

  • Updates patch security weaknesses, fix bugs, and improve reliability.
  • Attackers often look for devices that are still missing known patches.

What to demonstrate

  • Show how to check for operating system or app updates.
  • Show how to verify that the device is up to date after updates are installed.

Installing updates locked

Sign in or create an account to mark progress complete.

System security activities

Choose three activities you can complete with permission, then discuss the results with your counselor.

Select 3 activities

Pick any three system-security activities below. When three are selected, this step will mark complete.

0 selected, 3 required

Sign in or create an account to choose items and save progress.

Select items above to show their notes here. Choose at least 3.

System security activities locked

Sign in or create an account to mark progress complete.

Back: Cyber Threats, Vulnerabilities, and AttacksNext: Cryptography

Jump To A Requirement

Navigate anywhere in this merit badge without losing your place.

View Start Page