Cybersecurity


Resources
Cybersecurity Requirements Current Scouts BSA requirements
as of October 16, 2025
as of October 16, 2025
1.
Safety. Do the following:
a.
View the Personal Safety Awareness "Digital Safety" video (with your
parent or guardian's permission).
Resource:
b.
Explain to your counselor how to protect your digital footprint,
such as while using social media, mobile device apps, and online gaming.
Show how to set privacy settings to protect your personal information,
including photos of yourself or your location.
c.
Discuss first aid and prevention for potential injuries, such as eye
strain, repetitive injuries, and handling electronics devices, that
could occur during repeated use. Discuss how to keep yourself physically
safe while using a mobile device (for example while walking or
biking).
2.
Ethics. Do the following:
a.
Relate three points of the Scout law to things people do on the
internet or with computers, phones, and other connected electronic
devices.
Resources:
- Code of Ethics (website)
- The Ten Commandments of Computer Ethics (website)
b.
Discuss with your counselor examples of ethical and unethical
behavior in cyberspace. Include how to act responsibly when you
encounter situations such as: coming across an unattended or unlocked
computer or mobile device; observing someone type their password or
seeing it written down near a computer; or discovering a website that is
not properly secured. Explain why these situations require good
judgement, and how the Scout Law and personal values should guide your
actions.
3.
Fundamentals. Do the following and discuss each with your
counselor:
a.
Describe three types of computer systems that need protecting and
explain why.
b.
Explain the "C.I.A. Triad"—Confidentiality, Integrity, and
Availability—and why these three principles are fundamental to
cybersecurity.
Resources:
- What Is the CIA Triad (IBM Technology) (video)
- What Is the CIA Triad? | Coursera (website)
4.
Cyber Threats, Vulnerabilities, and Attacks. Do the following and
discuss each with your counselor:
a.
Define the terms vulnerability, threat, and exploit, and give an
example of each that might apply to a website or software product you
use.
b.
Pick one type of malware (such as virus, worm, Trojan, backdoor,
spyware, or ransomware) and find out how it works. Explain what it does
and the harm it can cause.
Resources:
c.
Identify two risks of using public Wi-Fi and describe how to reduce
or avoid those risks.
Resources:
d.
Describe what spoofing and phishing are, and how to recognize a
message or website that might be trying to trick you. Explain what steps
you should take to protect yourself and others if you come across one.
Resources:
e.
Current Events. Do ONE of the following:
1.
Read an article or a news report about a recent cybersecurity
incident, such as a data breach or malware infection. Explain how the
incident happened (to the best of your ability based on the information
available) and what the consequences are or might be to the victim.
2.
With your parent or guardian's permission, watch a movie or read a
book in which cybersecurity plays a significant role. Discuss how
cybersecurity topics were depicted and how realistic you think it was.
Resources:
- Suggested Movies: WarGames (1983, PG), Tron (1982, PG), Code 2600 (2011 Documentary, PG), Superman III (1983, PG), Scooby-Doo and the Cyber Chase (2001, Not Rated), Cyber War 2022 (2023 Documentary, G), Hackers (1995, PG-13), Terms and Conditions May Apply (2013 Documentary, Not Rated), Cyber War (2016 Documentary, Not Rated), and Zero Days (2016 Documentary, PG-13).
- Suggested Books: The Cuckoo's Egg by Cliff Stoll, Tom Clancy's Net Force Explorers YA series, The Enigma Girls: How Ten Teenagers Broke Ciphers, Kept Secrets, and Helped Win World War II by Candace Fleming, Cyber-Thief Showdown (Geronimo Stilton #68) by Geronimo Stilton, Little Brother by Cory Doctorow (read for free online), Cyberama: A Children's Book on Internet Safety and Cybersecurity, The Renegade Reporters by Elissa Brent Weissman, The Oracle Code by Marieke Nijkamp, Hacker by Malorie Blackman, and City Spies series by James Ponti.
f.
Create a list of what is part of your cyber attack surface including
all the ways someone could try to access your personal information or
devices—such as online accounts, apps, or home networks.
Resource:
5.
Cyber Defenses. Do the following:
a.
Describe three technologies that are used to defend a computer or
network, such as access controls, antivirus software, firewall,
intrusion detection/prevention systems, and Virtual Private Network.
b.
Installing updates. Do the following:
1.
Explain to your counselor the importance of installing the latest
updates on your computer, why they are needed, and what kinds of
problems they can prevent.
Resources:
- How Not to Get Hacked: Install Updates (Code.org) (video)
- Update Software | CISA (website)
2.
Demonstrate to your counselor how to check for, download, and
install the latest updates for your computer or mobile device, or
another computer you have permission to use (if you are unable to do
this on your computer, you may use an online guide with screenshots to
demonstrate this). Show your counselor how to verify that your computer
or mobile device is up-to-date.
Resource:
c.
System security. With your parent or guardian's permission,
do THREE of the following using a computer or mobile device, and discuss
with your counselor:
1.
Describe what makes a good password and why. Set or change an
account password to one that is "strong."
Resources:
2.
Describe multi-factor authentication (MFA) and how it can be used to
improve security. Demonstrate how to use an authenticator app or other
MFA function.
Resources:
- Defense in Depth - Keys to Cybersecurity | Cyber.org (website)
- Multi-factor Authentication | Khan Academy (website)
- Turn On MFA | CISA (website)
- More Than a Password | CISA (website)
3.
Install and set up a password manager. Demonstrate how it works to
your counselor.
Resource:
4.
Run a virus scan. Show the results to your counselor.
Resources:
- Understanding Anti-Virus Software | CISA (website)
- Ensure Your OS Antivirus and Anti-Malware Protections are Active | CISA (website)
- How to Start a Scan for Viruses or Malware in Microsoft Defender - Microsoft Support (website)
- How to Run a Virus Scan on Windows 11: A Step-by-Step Guide - Solve Your Tech (website)
- How to Scan an Android Phone for Malware - Android Authority (website)
- MalwareBytes Free Virus Scanner (website)
- Free Online Virus Scan | Trend Micro HouseCall | Trend Micro (US) (website)
5.
Using a command line or other built-in tool, see what programs or
processes are running on your computer. Discuss with your counselor what
you see and what surprises you.
Resources:
- How to View All Running Processes in Windows 10 & 11 (video)
- How to Tell What's Running in the Background on Your PC (video)
- View Information About Mac Processes in Activity Monitor - Apple Support (Bw) (website)
- Kill Apps and Processes on Chromebook Using the Task Manager (video)
- How to Access Your Chromebook's Task Manager (video)
6.
Use a command line interface to view your computer's open network
connections. Discuss the results with your counselor.
Resources:
7.
Demonstrate how to back up your data from a mobile device to a local
computer or the cloud.
Resources:
- Apple:
- How to Back Up With iCloud - Apple Support (website)
- How to Back up Your iPhone, iPad, and iPod Touch - Apple Support (website)
- iCloud Data Security Overview - Apple Support (website)
- Android:
- Back Up or Restore Data on Your Android Device - Android Help (google.com) (website)
- Back Up Your Device - Android - Google One Help (website)
8.
Research best practices for protecting a home computer or network,
and make a checklist of FIVE things you and your family can do to stay
secure.
Resources:
- Secure Our World | CISA (website)
- Home Network Security | CISA (website)
- Protecting Your Home Network | NSA (pdf)
9.
Identify one or more other vulnerabilities on your home computer or
network or another computer or network you have permission to use and
discuss with your counselor. With permission from the system owner, take
the necessary actions to fix it.
6.
Cryptography. Do the following:
a.
Research and explain to your counselor three situations where
encryption is used in cybersecurity. For each situation, describe what
kind of encryption is used and why it is important.
b.
Show how you can know if your connection to a website is
encrypted.
Resources:
c.
Do ONE of the following:
1.
Create your own encryption code, such as a substitution cipher or
code book, and demonstrate using it to encrypt and decrypt a message.
Describe the strengths and weaknesses of your code.
Resources:
2.
Download and set up an app (from an official app store) that uses
end-to-end encryption. Explain to your counselor what this means, how it
works, and why it is more secure than other forms of communication (e.g.
SMS).
3.
Use a hashing tool (for example, using SHA or MD5) to create a
checksum for a file, document, or piece of text. Have a fellow Scout or
your counselor make a change to it, then recreate the checksum and
compare the new checksum to the original as a demonstration of file
integrity checking.
Resources:
4.
Create your own PGP (pretty good privacy) email key. Share your
public key with others (and your counselor). Also, get their public keys
and add them to your computer's key ring. Send a message that has been
digitally encrypted.
7.
Connected Devices and Internet of Things (IoT). Describe to your
counselor four electronic devices you encounter that could be connected to
the internet, why this connectivity can be useful, what risks are posed by
the connectivity, and how they could be protected.
8.
Cybersecurity Activities. Do ONE of the following:
a.
Learn about a cybersecurity competition, camp, or other activity you
could participate in (either now or in the future). Share what you
learned with your counselor, including the type of activity, time
commitment, and age of participants.
Resources:
- CyberPatriot: National Youth Cyber Defense Competition (website)
- picoCTF - CMU Cybersecurity Competition (website)
- AFA CyberCamps (website)
- U.S. Cyber Camp (website)
- National Cyber League (website)
b.
Participate in a cybersecurity competition with members of your
troop, school, or some other group approved by your counselor. Either
design your own competition or use an existing platform.
Resources:
c.
Give a presentation to your patrol, troop, or another group approved
by your counselor, on a cybersecurity topic of your choice. Your
presentation must include at least one demonstration and/or hands-on
activity.
9.
Careers. Do ONE of the following:
a.
Identify three career opportunities that would use skills and
knowledge in cybersecurity. Pick one and research the training,
education, certification requirements, experience, and expenses
associated with entering the field. Research the prospects for
employment, starting salary, advancement opportunities and career goals
associated with this career. Discuss what you learned with your
counselor and whether you might be interested in this career.
Resources:
- Career Exploration Cards | Cyber.org (pdf)
- Degrees & Certifications | Cyber.org (website)
- Information security and forensics analyst | What I do (video)
- Careers in Cybersecurity: CompTIA's Future of Tech (website)
- Military Cybersecurity Careers & Training | Cybermission (website)
- NCF Panel Discussion about Cybersecurity Careers | (podcast)
b.
Visit a business or organization that does work in cybersecurity.
Find out about different work roles, what they do, and how they acquired
their knowledge through college degrees or certifications. Share what
you learned with your counselor.

